Saturday, February 22, 2025
HomeKali LinuxOffensive Security released Win-KeX Version 2.0 that Brings Kali Desktop Experience in...

Offensive Security released Win-KeX Version 2.0 that Brings Kali Desktop Experience in Windows

Published on

SIEM as a Service

Follow Us on Google News

Win-Kex was first introduced with Kali Linux 2020.3, it provides a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). Version 2.0 was released with several new features and fix for the issues with the previous versions.

Win-KeX Version 2.0

To install and use Win-KeX it is required to have WSL v2 on x64 and it is not compatible with WSL v1, or arm64 and it requires Windows 10 version 2004 or higher.

The following are the new features with Win-KeX v2.0;

  • Win-KeX SL (Seamless Edition) – bye bye borders
  • Sound support
  • Multi-session support
  • KeX sessions can be run as root
  • Able to launch “kex” from anywhere – no more cd-ing into the Kali filesystem required
  • Shared clipboard – cut and paste content between Kali and Windows apps

Prerequisites

  • Running Windows 10 version 2004 or higher
  • Using Windows Terminal

To install Win-KeX in a kali WSL installation

sudo apt upgrade && sudo apt install -y kali-win-kex

With the new version Win-KeX it supports for two modes;

Window Mode

Win-KeX Window mode is the classic Win-KeX look and feels with one dedicated window for the Kali Linux desktop. Window mode helps to keep the Windows and Kali environments visually apart.

To launch Win-KeX in Window mode with sound support, type:

kex --win -s

Seamless Mode

Win-KeX SL mode provides seamless integration of Kali Linux into the Windows desktop with the Windows Start menu at the bottom and the Kali panel at the top of the screen.

All applications are launched in their windows sharing the same desktop as Windows applications.

Seamless mode removes the visual segregation between linux and window apps and offers a great platform to run a penetration test in Kali Linux and copy the results straight into a Windows app for the final report.

To launch Win-KeX in seamless mode with sound support, type:

kex --sl --s

You are also recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools. Also, Learn The Complete Kali Tools in Kali Linux Operating System.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Kali Linux 2024.3 Released With New Hacking Tools

Kali Linux 2024.3, the most recent iteration of Offensive Security's highly regarded Debian-based distribution...

Kali Linux 2024.2 Released With New Hacking Tools

The Kali Linux team has announced the release of Kali Linux 2024.2, the latest...

xz-utils Backdoor Affects Kali Linux Installations – How to Check for Infection

A critical vulnerability has been identified in the xz-utils package, versions 5.6.0 to 5.6.1,...