Wednesday, February 26, 2025
HomeKALIKali Linux 2019.4 Released - New Hacking Tools, Theme, Undercover Mode, and...

Kali Linux 2019.4 Released – New Hacking Tools, Theme, Undercover Mode, and More!!

Published on

SIEM as a Service

Follow Us on Google News

Kali Linux is an advanced penetration Linux distribution used for digital forensics and penetration testing purposes. The operating system has more than 600 penetration-testing programs.

It is built on the top of the Debian distribution, the first version of Kali Linux released in 2012, it can be installed computer’s hard disk, can be booted directly from a live CD or live USB and to be installed on a virtual machine.

Kali Linux 2019.4

The Offensive security team has done major changes with Kali Linux 2019.4, and they have addressed some long-time issues. Here are some notable updates and bugs fixes.

New Desktop Environment and GTK3 Theme

With the update, developers planned to address the performance issues, by removing overhead features that are not useful for a distribution like Kali and the fractured user experience, if you are using a high-end laptop or using a Raspberry Pi the user experience be the same. Another thing is the modern look than the traditional one.

So to address the issues they committed to a lightweight one that runs under all the levels of Kali installs and handles user requests without compromising user experience.

If you don’t like the new UI, you can still have the option to switch to the Gnome build.

Kali Undercover theme

The new Undercover theme which turns your Kali machine looks like a default Windows installation. This can be done by just typing kali-undercover in the terminal windows.

Kali Linux 2019.4

Then the magic happens, your Kali machine looks completely like a Windows installation which gives you more anonymity and you can switch back to the Kali theme whenever you like.

PowerShell

Another notable feature is the PowerShell repositories, with the new version you will get the ability to run the PowerShell scripts directly on Kali Linux.

BTRFS Snapshot

BTRFS is a much more useful inclusion, if you are running the Kali Linux directly on the computer there is not easy to make a snapshot of it for restoration if something went wrong.

With BTRFS now you will be getting a snapshot capability on a bare metal install while installing the Kali itself a separate btrfs partition and btrfs subvolumes outside of the installation volumes.

Kali Linux 2019.4

NetHunter

Introduction of NetHunter Kex, a full Kali Desktop on your Android phone, you can attach the Android device with Bluetooth keyboard and mouse.

Kali Linux 2019.4

If you are an existing user, you can run a quick update using the following command.

 root@kali:~# apt update && apt -y full-upgrade

After the update, you can verify the installation using the following command

root@kali:~# grep VERSION /etc/os-release

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.

Also, Learn The Complete Kali Tools in Kali Linux Operating System. Kali Linux 2019.4 can be downloaded from here.

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity and hacking news updates.

Also, Read

XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using Kali Linux

Kali Linux Team to Offer Free Access to Penetration Testing Course

DDOS a Website Anonymously by Using Kali Linux Tools

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

MITRE Releases OCCULT Framework to Address AI Security Challenges

MITRE has unveiled the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a groundbreaking...

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF)...

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Top 10 Best Proxy Server 2025 & Important Methods to Prevent Yourself From Hackers

Best Proxy Server has been used in enormous cases where some personal data or...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

10 Best Linux Distributions In 2024

The Linux Distros is generally acknowledged as the third of the holy triplet of...