Saturday, June 14, 2025
HomePENTESTINGParrot Security OS 4.0 Released With Number of New Powerful Tools and...

Parrot Security OS 4.0 Released With Number of New Powerful Tools and with Package Updates

Published on

SIEM as a Service

Follow Us on Google News

Parrot Security OS 4.0 released with a number of new tools, updated for packages and bug fixes that released since the last version 3.11.

Parrot security team aid this is an “important milestone in the history of our project.”

Parrot OS has a big repository that collects a lot of amazing hacking tools for newbies and experts. Developed by FrozenBox. The first release was in June 2013.

- Advertisement - Google News

The Parrot Security Operating System is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals.

Parrot Security OS 4.0 – New Tools

Netinstall Images

Netinstall Images added with Parrot 4.0, as an Experimental, because the installers failed when using https and work fine with HTTP said Parrot team.

With NetInstall images you can install the plain operating system or just only the required components. “we decided to provide netinstall images too as we would like people to use Parrot not only as a pentest distribution.”

Docker images

Docker images will be offered as a core container with only the bare system, a more complete environment with a lot of useful tools, and a container dedicated to the Metasploit environment.

With the docker images, you can get access to all the parrot tools in all the isolated environments you need.

Linux Kernel 4.16

Parrot Security OS 4.0 comes with new Linux Kernel 4.16 that contains a number of improvements such as the AMD GPU DC display driver included multi-display support, the patch that optimizes the update of inode data and metadata.

You can get free Free Cloud Linux VPS from providers like skysilk.

Parrot Security OS 4.0

With the last release Parrot, 3.11 contains the basic spectre/meltdown fixes.

Stable and reliable sandboxed applications available with Parrot 4.0

Mate Desktop updates to version 1.20, it contains many graphics bug fix, HiDPI support and ability to resize the windows.

Instead of the heavy Apache2, the famous and lightweight web server Nginx added as a default web server daemon.

LibreOffice 6 comes default in the images starting from Parrot Security OS 4.0 and it includes the latest version of Firefox version 60.

Now MD Raid Support supported by default, so that parrot can be installed in a software raid for better reliability.

If you are using any previous version of Parrot OS you can update with following commands

sudo apt update
sudo apt purge tomoyo-tools
sudo apt full-upgrade
sudo apt autoremove

You can Download the current Parrot Security OS 4.0 here.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Top 10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Cloud Penetration Testing Checklist – 2024

Cloud Penetration Testing is a method of actively checking and examining the Cloud system...

An Ultimate Checklist for Application Security Testing

According to a report by MarketsandMarkets, “The application security Testing market is expected to...