Friday, March 28, 2025
HomeKali LinuxOffensive Security released Win-KeX Version 2.0 that Brings Kali Desktop Experience in...

Offensive Security released Win-KeX Version 2.0 that Brings Kali Desktop Experience in Windows

Published on

SIEM as a Service

Follow Us on Google News

Win-Kex was first introduced with Kali Linux 2020.3, it provides a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). Version 2.0 was released with several new features and fix for the issues with the previous versions.

Win-KeX Version 2.0

To install and use Win-KeX it is required to have WSL v2 on x64 and it is not compatible with WSL v1, or arm64 and it requires Windows 10 version 2004 or higher.

The following are the new features with Win-KeX v2.0;

  • Win-KeX SL (Seamless Edition) – bye bye borders
  • Sound support
  • Multi-session support
  • KeX sessions can be run as root
  • Able to launch “kex” from anywhere – no more cd-ing into the Kali filesystem required
  • Shared clipboard – cut and paste content between Kali and Windows apps

Prerequisites

  • Running Windows 10 version 2004 or higher
  • Using Windows Terminal

To install Win-KeX in a kali WSL installation

sudo apt upgrade && sudo apt install -y kali-win-kex

With the new version Win-KeX it supports for two modes;

Window Mode

Win-KeX Window mode is the classic Win-KeX look and feels with one dedicated window for the Kali Linux desktop. Window mode helps to keep the Windows and Kali environments visually apart.

To launch Win-KeX in Window mode with sound support, type:

kex --win -s

Seamless Mode

Win-KeX SL mode provides seamless integration of Kali Linux into the Windows desktop with the Windows Start menu at the bottom and the Kali panel at the top of the screen.

All applications are launched in their windows sharing the same desktop as Windows applications.

Seamless mode removes the visual segregation between linux and window apps and offers a great platform to run a penetration test in Kali Linux and copy the results straight into a Windows app for the final report.

To launch Win-KeX in seamless mode with sound support, type:

kex --sl --s

You are also recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools. Also, Learn The Complete Kali Tools in Kali Linux Operating System.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

In a complex cyber operation discovered by Silent Push Threat Analysts, Russian hackers have...

SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server

Elastic Security Labs has uncovered a sophisticated malware campaign, dubbed REF8685, targeting the Iraqi...

46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with Settings

Forescout Vedere Labs has uncovered 46 new vulnerabilities in solar power systems, primarily affecting...

DeBackdoor: A Framework for Detecting Backdoor Attacks in Deep Learning Models

Deep learning models, increasingly integral to safety-critical systems like self-driving cars and medical devices,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Kali Linux 2025.1a Released: New Tools and Desktop Environment Upgrades

Kali Linux, the renowned cybersecurity-focused Linux distribution, has just ushered in the new year...

Kali Linux 2024.3 Released With New Hacking Tools

Kali Linux 2024.3, the most recent iteration of Offensive Security's highly regarded Debian-based distribution...

Kali Linux 2024.2 Released With New Hacking Tools

The Kali Linux team has announced the release of Kali Linux 2024.2, the latest...