References
- “Official Kali Linux Releases”. Retrieved 2020-08-29.
- “Kali Linux 2023.4 Release (Cloud ARM64, Vagrant Hyper-V & Raspberry Pi 5)”. 5 December 2023. Retrieved 5 December 2023.
- Nestor, Marius (26 November 2019). “Kali Linux Ethical Hacking OS Switches to Xfce Desktop, Gets New Look and Feel”. softpedia. Retrieved 2019-11-29.
- “Kali Linux 1.0 review”. LinuxBSDos.com. 2013-03-14. Retrieved 2019-11-26.
- Simionato, Lorenzo (2007-04-24). “Review: BackTrack 2 security live CD”. Linux.com. Retrieved 2019-04-10.
- Barr, Joe (13 June 2008). “Test your environment's security with BackTrack”. Linux.com. Retrieved 2019-04-10.
- “BackTrack 4 - Hacking galore”. Dedoimedo.com. 2009-05-15. Retrieved 2019-04-10.
- “BackTrack 5 R3 review”. LinuxBSDos.com. 2012-08-17. Retrieved 2019-04-10.
- Watson, J.A. (2014-05-28). “Hands-on with Kali Linux 1.0.7”. ZDNet.com. Retrieved 2019-04-10.
- “Kali Linux 1.0.7 review”. LinuxBSDos.com. 2014-05-30. Retrieved 2019-04-10.
- “Kali Linux review”. Dedoimedo.com. 2014-12-15. Retrieved 2019-04-10.
- Watson, J.A. (2016-01-22). “Hands-on with Kali Linux Rolling”. ZDNet.com. Retrieved 2019-04-10.
- Smith, Jesse (2016-04-25). “Kali Linux 2016.1”. DistroWatch Weekly. No. 658. Retrieved 2019-04-10.
- “Kali's Relationship with Debian”. Kali Linux. 2013-03-11. Retrieved 2019-04-10.
- “Kali Linux Penetration Testing Tools”. tools. kali.org. Retrieved 2019-04-10.
- “Kali Linux Metapackages”.
www.kali.org . 26 February 2014. Retrieved 2019-12-22. - “Kali Linux arrives as enterprise-ready version of BackTrack - The H Open: News and Features”.
www.h-online.com . Retrieved 2019-12-22. - “Mr. Robot and Kali Linux”. 29 December 2020./
- Leroux, Sylvain (3 May 2017). “The Kali Linux Review You Must Read Before You Start Using it”. itsfoss.com. Retrieved 2020-04-15.
- Grauer, Yael (2015-08-26). “A Peek Inside Mr. Robot's Toolbox”. Wired. ISSN:1059-1028. Retrieved 2020-04-15.
- “Exploring the Hacker Tools of Mr Robot”. HackerTarget.com. 2015-08-21. Retrieved 2020-04-15.
- “Kali Linux 2020.4 Release”.
www.kali.org . 18 November 2020. Retrieved 2021-01-12. - “Kali Linux Hard Disk Install”. Kali Linux Official Documentation. Archived from the original on 2020-05-19. Retrieved 2020-05-28.
- Pauli, Darren (2013-03-13). “BackTrack successor Kali Linux launched”. SC Magazine. Retrieved 2019-04-10.
- Orin, Andy (2014-12-03). “Behind the App: The Story of Kali Linux”. Lifehacker. Retrieved 2019-04-10. Mati Aharoni: One of our goals with Kali is to provide images of the operating system for all sorts of exotic hardware—mainly ARM based. This includes everything from Raspberry Pi's to tablets, to Android TV devices, with each piece of hardware having some unique property.
- “04. Kali Linux on ARM”. Retrieved 2019-09-04.
- muts (2018-03-05). “Kali Linux in the Windows App Store”. Kali Linux. Retrieved 2019-04-10.
- “Kali Linux NetHunter for Nexus and OnePlus”. Retrieved 2019-04-10.
- “Kali Linux Forensics Mode”. Retrieved 2019-04-10.
- Gray, Lerma (12 February 2021). “11 Best Linux Distros for Hacking And Penetration Testing in 2021 – dev.Count”. Retrieved 2022-05-02.
- “Kali's Default Credentials | Kali Linux Documentation”. Kali Linux. Retrieved 2022-05-02.
- “Burp Suite - Application Security Testing Software”. portswigger.net. Retrieved 2023-09-29.
- “BeEF - The Browser Exploitation Framework Project”. beefproject.com. Retrieved 2023-09-29.
- “cisco-global-exploiter | Kali Linux Tools”. Kali Linux. Retrieved 2023-09-29.
- “sqlmap: automatic SQL injection and database takeover tool”. sqlmap.org. Retrieved 2023-09-29.
- “WPScan: WordPress Security Scanner”. wpscan.com. Retrieved 2023-09-29.
- Reverse Engineer's Toolkit, Mente Binária, 2023-09-28, retrieved 2023-09-29
- dev-gsniper (2023-09-27), Reverse-Engineering-toolkit, retrieved 2023-09-29.
- “Vulnerable By Design ~ VulnHub”.
www.vulnhub.com . Retrieved 2023-09-29. - Hertzog, Raphael; O'Gorman, Jim; Aharoni, Mati (2017-06-05). Kali Linux Revealed: Mastering the Penetration Testing Distribution. Offsec Press. ISBN: 978-0-9976156-0-9.
- Kali Linux Revealed (PDF). Archived from the original (PDF) on 2021-01-02. Retrieved 2020-03-17.
- C. Balaji, B. Ramadoss, and N. Yasuyuki, “Secure information transmission framework in wireless body area networks,” Journal of Applied Security Research, vol. 15, no. 2, pp. 279–287, 2020.
- Akhtar, Z. (2024). Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques. International Journal of Advanced Network, Monitoring and Controls, 9(1) 100–111.
https://doi.org/10.2478/ijanmc-2024-0010 . - Bin Akhtar, Z. (2022). A Revolutionary Gaming Style in Motion. IntechOpen. doi: 10.5772/intechopen.100551.