Wednesday, February 26, 2025
HomeCyber Security NewsKali Linux 2022.1 Released with New Tools and Kali Everything Image

Kali Linux 2022.1 Released with New Tools and Kali Everything Image

Published on

SIEM as a Service

Follow Us on Google News

Offensive Security has recently released the new version of Kali Linux, Kali Linux 2022.1 that brings some exciting new features, and this version is the first release of 2022.

In this new version, Offensive Security has completely revised the look and feel of Kali Linux 2022.1 that includes:-

  • New backgrounds for the desktop
  • New login and the start screen

And here, the most surprising thing that they have announced is from now on, this should be done annually in order to better distinguish between the different versions of Kali Linux.

Kali Linux 2022.1: What’s new?

Besides all other features, in this version, the developers of Kali Linux have mainly focused on the visual department as compared to the earlier versions.

And below, we have mentioned all the newly added features in Kali Linux 2022.1 by the developers of Kali Linux:-

  • Visual Refresh – Updated wallpapers and GRUB theme.
  • Shell Prompt Changes – Visual improvements to improve readability when copying code.
  • Refreshed Browser Landing Page – Firefox and Chromium homepage has had a makeover to help you access everything Kali you need.
  • Kali Everything Image – An all-packages-in-one solution now available to download.
  • Kali-Tweaks Meets SSH – Connect to old SSH servers using legacy SSH protocols and ciphers.
  • VMware i3 Improvements – Host-guest features properly work now on i3.
  • Accessibility Features – Speech synthesis is back in the Kali installer.
  • New Tools – Various new tools added, many from ProjectDiscovery!

New tools in Kali Linux 2022.1

In total, there are six tools that are added by the Offensive Security in Kali Linux 2022.1, and here they are mentioned below:-

  • dnsx – Fast and multi-purpose DNS toolkit allows running multiple DNS queries.
  • email2phonenumber – An OSINT tool to obtain a target’s phone number just by having his email address.
  • naabu – A fast port scanner with a focus on reliability and simplicity.
  • nuclei – Targeted scanning based on templates.
  • PoshC2 – A proxy-aware C2 framework with post-exploitation and lateral movement.
  • proxify – Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.

Other Improvements

Here below we have mentioned all the other improvements done in Kali Linux 2022.1:-

  • Accessibility improvements.
  • New packages are available for the ARM64 architecture.
  • Linux Kernel 5.15.
  • Using a setting in kali-tweaks, you can now enable legacy algorithms, ciphers, SSH.
  • To remove the skull icon, exit code, and the number of background processes, shell prompt tweaks are available.

Download Kali Linux 2022.1

If you want to update your Kali Linux or want to download the Kali Linux 2022.1, you just have to follow the steps that we have mentioned below.

For upgrading your existing version to the latest version, follow the command:-

echo “deb http://http.kali.org/kali kali-rolling main non-free contrib” | sudo tee /etc/apt/sources.list
sudo apt update && sudo apt -y full-upgrade
cp -rbi /etc/skel/. ~
[ -f /var/run/reboot-required ] && sudo reboot -f

But, if you want to download the Kali Linux 2022.1 independently, then you can download the ISO images from here for new installs and live distributions.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

MITRE Releases OCCULT Framework to Address AI Security Challenges

MITRE has unveiled the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a groundbreaking...

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF)...

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

MITRE Releases OCCULT Framework to Address AI Security Challenges

MITRE has unveiled the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a groundbreaking...

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF)...

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...