Kali Linux 2025.2 Released: What’s New in the Latest Security Distribution?

The release of the distribution for information security experts and penetration testers, **Kali Linux 2025.2**, has taken place. This project is built on the Debian package base and is intended for vulnerability testing, security audits, residual information analysis, and attack consequence identification.

All of the project’s original contributions for the distribution are shared under the GPL license and can be accessed via the public **Git repository**. ISO images are made available for download. The project supports architectures such as x86_64, ARM (including armhf and armel, Raspberry Pi, Banana Pi, ARM Chromebook, and Odroid). Users can choose from desktop environments including Xfce, KDE, and GNOME.

Kali Linux provides a comprehensive suite of tools for computer security professionals, covering everything from web application testing and wireless network penetration to programs for extracting data from RFID identification chips.

Included in Kali Linux is a collection of exploits and around 400 specialized utilities for security assessment (the new version introduces 13 new tools alongside numerous enhancements), featuring well-known applications like Aircrack, Maltego, SAINT, Kismet, Bluebugger, Btcrack, Btscanner, Nmap, and p0f. Additionally, the distribution offers password recovery tools (Multihash CUDA Brute Forcer) and WPA key recovery tools (Pyrit) that utilize NVIDIA and AMD GPUs for acceleration.

Kali Linux 2025.2 is powered by the Linux 6.12 kernel and features the GNOME 48 desktop environment. It includes utilities such as:

— **azurehound**: A data collector in Microsoft Azure for visualization through the BloodHound package.
— **binwalk3**: A toolkit for firmware analysis.
— **bloodhound-ce-python**: A Python-based collector for BloodHound.
— **bopscrk**: A password dictionary generator.
— **chisel-common-binaries**: Precompiled binaries of chisel.
— **crlfuzz**: A tool for testing vulnerabilities related to newline or carriage return substitutions in HTTP headers and request parameters.
— **donut-shellcode**: Generates universal shellcode from memory content.
— **gitxray**: Data collection from GitHub repositories and their contributors.
— **ldeep**: A utility for content enumeration via LDAP.
— **ligolo-ng-common-binaries**: Precompiled binaries of ligolo-ng.
— **rubeus**: A low-level tool for working with Kerberos.
— **sharphound**: A data collector for BloodHound CE.
— **tinja**: A utility for testing web pages for template injection vulnerabilities.

According to information from **OpenNET**, the main updates and improvements in Kali Linux 2025.2 include:

— A complete redesign of the application menu, aligning it with the MITRE ATT&CK knowledge base classifier.
— Addition of an indicator in the GNOME session that shows the current VPN connection’s IP address, previously available in the Xfce session.
— The KDE desktop environment has been upgraded to **Plasma 6.3**.
— Transition from the outdated **BloodHound Legacy** toolkit, last updated in 2023, to the **BloodHound Community Edition**, used for mapping relationships in networks based on Active Directory or Azure domain controllers.
— Inclusion of the **Xclip** utility in all graphical sessions for quick copy-paste functionality from the terminal.
— A refreshed mobile environment based on Android featuring **NetHunter**, a set of tools for vulnerability testing. Using NetHunter, specific mobile attacks can be tested, including USB device emulation for MITM attacks or creating rogue access points.
— The ability to conduct **Wi-Fi attacks**, frame injection, and WPA2 connection parameter interception using smartwatches based on bcm43 436b0 chips, such as the TicWatch Pro 3.
— The **CARsenal** toolkit for attacking automotive information systems has been updated, with new kernel options for devices like Xiaomi Redmi 4/4X, Xiaomi Redmi Note 11, Realme C15, and Samsung Galaxy S9 and S10.
— Raspberry Pi builds have been unified and updated to run on the Linux 6.12 kernel.