Friday, May 2, 2025
HomeKALIKali Linux 2017.2 Released With Powerful New Tools

Kali Linux 2017.2 Released With Powerful New Tools

Published on

SIEM as a Service

Follow Us on Google News

Kali Linux is a Penetration Testing Distribution based on Debian. Developed by Offensive Security. It is the world’s most capable and famous security testing platform, utilized by security experts in an extensive variety of specializations, including penetration testing, forensics, reverse engineering, and vulnerability assessment.

Kali Linux 2017.2

With the new release, they have added dozens of Powerfull tools and also updates for existing tools, if you are kali lover then it’s time to Upgrade by using following Commands.

apt update
apt dist-upgrade
reboot
 

At the time of writing, we have updates running, we will soon post tutorials, stay tuned for it.

- Advertisement - Google News

Also read Operating system for Hackers

In the meantime, you can refer or Kali Linux Tutorials page which covers dozens of Kali Linux Tools. First Time users can download from here.

Some New Tools

  • hurl – a beneficial little hexadecimal and URL encoder/decoder
  • phishery – phishery lets you inject SSL-enabled basic auth phishing URLs into a .docx Word document
  • ssh-audit – an SSH server auditor that checks for encryption types, banners, compression, and more
  • apt2 – an Automated Penetration Testing Toolkit that runs its own scans or imports results from various scanners, and takes action on them
  • bloodhound – uses graph theory to reveal the hidden or unintended relationships within Active Directory
  • crackmapexec – a post-exploitation tool to help automate the assessment of large Active Directory networks
  • dbeaver – powerful GUI database manager that supports the most popular databases, including MySQL, PostgreSQL, Oracle, SQLite, and much more
  • brutespray – automatically attempts default credentials on discovered services

Important Tool Updates

You can see the complete tool updates here, few important tools here

  • jd-gui,
  • dnsenum,
  • edb-debugger,
  • wpscan,
  • watobo,
  • Burpsuite

More than that they are working towards enhancing the overall integration of bundles in Kali Linux. Like Kali Linux, there are some top Penetration Testing & Ethical Hacking Linux Distributions you can see them here.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Multiple Dutch organizations have experienced significant service disruptions this week due to a series...

Seven Malicious Packages Exploit Gmail SMTP to Run Harmful Commands

A major supply chain security incident has rocked the Python open-source community as researchers...

CISA Issues New ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued two new advisories revealing critical...

NVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code

NVIDIA has issued an urgent security advisory after discovering a significant vulnerability (CVE-2025-23254) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Kali Linux 2025.1a Released: New Tools and Desktop Environment Upgrades

Kali Linux, the renowned cybersecurity-focused Linux distribution, has just ushered in the new year...

Kali Linux 2024.2 Released With New Hacking Tools

The Kali Linux team has announced the release of Kali Linux 2024.2, the latest...

xz-utils Backdoor Affects Kali Linux Installations – How to Check for Infection

A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1,...