Categories: KALIKali Linux

Kali NetHunter App Store – Free Android Store for Security Apps

Kali Linux announced a free Kali NetHunter App Store available for non-NetHunter devices so that anyone can avail the packages. Starting from Kali NetHunter 2019.2 it supports more than 50 Android devices running KitKat through to Pie.

“The Kali NetHunter App Store is a one-stop-shop for security-relevant Android applications. It is the ultimate alternative to the Google Play store for any Android device, whether rooted or not, NetHunter or stock,” reads the blog post.

If you like to install any security applications to your device then the NetHunter Store is the perfect place to get it.

App developers can request submit a request form here, to get their application to be included in the Kali NetHunter App Store.

If you are a user of a specific application and want to make the app available through the store, then you can request for the inclusion, so that Kali team will check authors consent to publish it in our store.

“NetHunter is a community project. It is driven by the community for the community and it is a whole lot of fun. The project is centered around bringing Kali Linux to Android devices and to add a user experience that makes Android a valid alternative for certain areas of penetration testing and hacking.”

The app store covers wide areas of technologies that includes

  • Android app development
  • Rooting Android & creating custom recovery installers
  • Kernel & kernel drivers, in particular, WiFi
  • Kali Linux
  • All tools that ship with Kali Linux
  • Web technologies
  • Android package management

Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.

Also, you can Learn The Complete Hacking Tools in Kali Linux Operating System from trusted Worlds leading Ethical Hackers Elearning Platform.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

7 hours ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

7 hours ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

7 hours ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

7 hours ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

7 hours ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

21 hours ago