Kali Linux is widely used by organizations for penetration testing, vulnerability assessments, web application security, network audits, ethical hacking, and open-source intelligence, providing extensive free features.
Product | Market Share (%) |
---|---|
Kali Linux | 3.0% |
Rocky Linux | 14.3% |
Ubuntu Linux | 11.5% |
Other | 71.2% |
Type | Title | Date | |
---|---|---|---|
Category | Operating Systems (OS) for Business | Oct 3, 2025 | Download |
Product | Reviews, tips, and advice from real users | Oct 3, 2025 | Download |
Comparison | Kali Linux vs Red Hat Enterprise Linux (RHEL) | Oct 3, 2025 | Download |
Comparison | Kali Linux vs Ubuntu Linux | Oct 3, 2025 | Download |
Comparison | Kali Linux vs Oracle Linux | Oct 3, 2025 | Download |
Title | Rating | Mindshare | Recommending | |
---|---|---|---|---|
Ubuntu Linux | 4.3 | 11.5% | 95% | 149 interviewsAdd to research |
Rocky Linux | 4.3 | 14.3% | 100% | 10 interviewsAdd to research |
Company Size | Count |
---|---|
Small Business | 9 |
Midsize Enterprise | 1 |
Large Enterprise | 6 |
Company Size | Count |
---|---|
Small Business | 96 |
Midsize Enterprise | 51 |
Large Enterprise | 137 |
Organizations run Kali Linux in virtualized environments alongside other operating systems, employing tools for automated scans, malware identification, infrastructure testing, and application development or hosting. These users benefit from lower maintenance requirements and a smaller footprint. The toolset includes Nmap, SQLMap, Metasploit, and Hydra, ensuring effective security assessments. Its high scalability, performance, user-friendly interface, and extensive documentation enhance the platform's usability. Known for stability, flexibility, and virus resistance, Kali Linux supports web security, troubleshooting, and configuration tasks comprehensively.
What are the most important features of Kali Linux?
What benefits and ROI should users look for in reviews?
Kali Linux can support industries in improving security through stable and flexible environments that resist viruses and provide extensive documentation. Users employ it for web security, troubleshooting, and configuring capabilities. Necessary improvements include automation, user-friendliness, and integrating AI and blockchain. Enhancements in security features, faster installations, and better learning tools are also essential. Machine learning integration and non-enterprise user functionalities can address current limitations.
Author info | Rating | Review Summary |
---|---|---|
Senior Technical Manager at a tech vendor with 10,001+ employees | 4.0 | We've used Kali Linux for backend vulnerability assessments, finding its real-time scanning capabilities valuable, though it lacks customizable port scanning. Setup was manageable, performance stable, and we're still exploring its full potential after several months of use. |
Associate Consultant at a consultancy with 10,001+ employees | 4.0 | I've used Kali Linux for a few years to learn pen testing and Linux fundamentals; it's fast, stable, and security-focused, though it could improve hardware detection, UI customization, and wider hardware compatibility for broader accessibility. |
SWE-1 at a tech vendor with 10,001+ employees | 4.0 | I use Kali Linux for penetration testing and cybersecurity due to its open-source flexibility, robust pre-installed tools, and scalability, though it could improve user-friendliness and support; overall, it significantly enhances our network security and testing efficiency. |
IT Manager at PRATHAM SOFTWARE PRIVATE LIMITED | 4.0 | I use Kali Linux primarily for penetration and network testing in various sectors, including IT and banking. While it's highly capable with tools like SQLmap, installation can be problematic, and the interface could be more user-friendly for beginners. |
Manager at Accenture company | 5.0 | I use Kali Linux for hosting and application development due to its low maintenance and stability. While it's already well-developed, improving security is crucial, especially in cloud environments. Its smaller footprint compared to Windows is advantageous. |
Junior Executive - Information Security at sunshine holdings | 5.0 | I use Kali Linux in my company for vulnerability assessments and penetration testing. The interface is straightforward, but older versions had UI issues. While the latest version improved, occasional lagging remains a concern. Overall, it's useful for identifying vulnerabilities. |
Cyber Security Consultant - APAC at Logon Software | 4.0 | I use Kali Linux alongside Nmap for network audits and to find vulnerabilities through controlled attacks. It is ideal for penetration testing on networks, web applications, and Android apps, though it could benefit from improved security features. |
Researcher in Cyber Security at Sekolah Tinggi Ilmu Statistik BPS | 4.5 | I use Kali Linux for penetration testing projects within a Windows 11 virtual environment. It offers valuable tools like SQLMap and Nmap for security tasks. However, its installation in virtualized environments can be slow, possibly due to download sources. |