Categories: KALIKali LinuxTop 10

Kali Linux 2019.4 Released – New Hacking Tools, Theme, Undercover Mode, and More!!

Kali Linux is an advanced penetration Linux distribution used for digital forensics and penetration testing purposes. The operating system has more than 600 penetration-testing programs.

It is built on the top of the Debian distribution, the first version of Kali Linux released in 2012, it can be installed computer’s hard disk, can be booted directly from a live CD or live USB and to be installed on a virtual machine.

Kali Linux 2019.4

The Offensive security team has done major changes with Kali Linux 2019.4, and they have addressed some long-time issues. Here are some notable updates and bugs fixes.

New Desktop Environment and GTK3 Theme

With the update, developers planned to address the performance issues, by removing overhead features that are not useful for a distribution like Kali and the fractured user experience, if you are using a high-end laptop or using a Raspberry Pi the user experience be the same. Another thing is the modern look than the traditional one.

So to address the issues they committed to a lightweight one that runs under all the levels of Kali installs and handles user requests without compromising user experience.

If you don’t like the new UI, you can still have the option to switch to the Gnome build.

Kali Undercover theme

The new Undercover theme which turns your Kali machine looks like a default Windows installation. This can be done by just typing kali-undercover in the terminal windows.

Then the magic happens, your Kali machine looks completely like a Windows installation which gives you more anonymity and you can switch back to the Kali theme whenever you like.

PowerShell

Another notable feature is the PowerShell repositories, with the new version you will get the ability to run the PowerShell scripts directly on Kali Linux.

BTRFS Snapshot

BTRFS is a much more useful inclusion, if you are running the Kali Linux directly on the computer there is not easy to make a snapshot of it for restoration if something went wrong.

With BTRFS now you will be getting a snapshot capability on a bare metal install while installing the Kali itself a separate btrfs partition and btrfs subvolumes outside of the installation volumes.

NetHunter

Introduction of NetHunter Kex, a full Kali Desktop on your Android phone, you can attach the Android device with Bluetooth keyboard and mouse.

If you are an existing user, you can run a quick update using the following command.

 root@kali:~# apt update && apt -y full-upgrade

After the update, you can verify the installation using the following command

root@kali:~# grep VERSION /etc/os-release

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.

Also, Learn The Complete Kali Tools in Kali Linux Operating System. Kali Linux 2019.4 can be downloaded from here.

You can follow us on LinkedinTwitter, and Facebook for daily Cybersecurity and hacking news updates.

Also, Read

XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using Kali Linux

Kali Linux Team to Offer Free Access to Penetration Testing Course

DDOS a Website Anonymously by Using Kali Linux Tools

Guru baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

  • I can't use undercover Feature, why?
    I can't find it anywhere.
    I am using Berkeley Repos, is that anything to do with this?

    • "I can’t use undercover Feature, why?
      I can’t find it anywhere."
      There is literally a section in this post called "Kali Undercover theme." This heading consists of three sentences and a graphical demonstration of the feature.

      "I am using Berkeley Repos, is that anything to do with this?"
      Huh? Think about this a bit, would it make sense to limit default features to specific mirrors. The directions are simple and easy to follow, it is hard to get lost even if there is a small typo.

Recent Posts

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt…

1 day ago

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a threat actor to read sensitive files…

1 day ago

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes. Resecurity researchers have recently revealed that…

1 day ago

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million Ecuadorian citizens. The announcement was made…

1 day ago

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery efforts following a recent cybersecurity breach.…

1 day ago

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection for Amazon Simple Storage Service (Amazon…

2 days ago