Kali Linux Command Cheat Sheet
The ultimate reference guide for penetration testing tools and commands
Table of Contents
- Introduction to Kali Linux
- System Commands
- Network Commands & Utilities
- Information Gathering
- Vulnerability Scanning
- Exploitation Tools
- Web Application Tools
- Password Attacks
- Wireless Attacks
- Sniffing & Spoofing
- Post Exploitation
- Digital Forensics
- Reporting Tools
- Social Engineering
- Anonymity Tools
- Bash Scripting for Pentesters
Introduction to Kali Linux
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security and comes pre-installed with numerous security tools.
Basic System Information
Package Management
System Commands
File System Navigation
User Management
Process Management
Network Commands & Utilities
Network Configuration
Network Troubleshooting
Information Gathering
DNS Reconnaissance
Subdomain Enumeration
WHOIS & IP Information
Vulnerability Scanning
Port Scanning with Nmap
Vulnerability Scanners
Exploitation Tools
Metasploit Framework
Exploitation Examples
Other Exploitation Tools
Web Application Tools
Web Vulnerability Scanning
Web Exploitation
Password Attacks
Password Cracking
Wireless Attacks
Wireless Reconnaissance
Wireless Exploitation
Sniffing & Spoofing
Packet Sniffing
Spoofing & MITM
Post Exploitation
Privilege Escalation
Persistence
Digital Forensics
File Analysis
Disk Analysis
Reporting Tools
Report Generation
Anonymity Tools
Tor & Proxychains
Bash Scripting for Pentesters
Basic Scripting
Advanced Scripting
Discover more from Cyber Samir
Subscribe to get the latest posts sent to your email.
Social Engineering
Social Engineering Toolkit (SET)