An open API service indexing awesome lists of open source software.

https://github.com/labex-labs/kali-free-tutorials

Practice Kali Linux Free Tutorials | This repo collects 51 of free tutorials for Kali Linux. Kali is a specialized Linux distribution designed for security researchers and penetration testers. This Skill Tree offers a comprehensive learning path for mastering Kali Linux. Itโ€™s perfect for beginner...
https://github.com/labex-labs/kali-free-tutorials

List: kali-free-tutorials

awesome awesome-list exercises free free-tutorials hands-on kali labex programming tutorials

Last synced: 6 months ago
JSON representation

Practice Kali Linux Free Tutorials | This repo collects 51 of free tutorials for Kali Linux. Kali is a specialized Linux distribution designed for security researchers and penetration testers. This Skill Tree offers a comprehensive learning path for mastering Kali Linux. Itโ€™s perfect for beginner...

Awesome Lists containing this project

README

          

# Practice Kali Linux Free Tutorials

## Languages

๐Ÿ‡จ๐Ÿ‡ณ [็ฎ€ไฝ“ไธญๆ–‡](README_zh.md) ๐Ÿ‡ฏ๐Ÿ‡ต [ๆ—ฅๆœฌ่ชž](README_ja.md) ๐Ÿ‡ช๐Ÿ‡ธ [Espaรฑol](README_es.md) ๐Ÿ‡ซ๐Ÿ‡ท [Franรงais](README_fr.md) ๐Ÿ‡ฉ๐Ÿ‡ช [Deutsch](README_de.md) ๐Ÿ‡ท๐Ÿ‡บ [ะ ัƒััะบะธะน](README_ru.md) ๐Ÿ‡ฐ๐Ÿ‡ท [ํ•œ๊ตญ์–ด](README_ko.md) ๐Ÿ‡ง๐Ÿ‡ท [Portuguรชs](README_pt.md) ๐Ÿ‡บ๐Ÿ‡ธ [English](README.md)



Kali is a specialized Linux distribution designed for security researchers and penetration testers. This Skill Tree offers a comprehensive learning path for mastering Kali Linux. Itโ€™s perfect for beginners in cybersecurity, providing a structured roadmap to understand penetration testing, ethical hacking, and security auditing. Through hands-on, non-video courses and practical exercises in an interactive Kali environment, youโ€™ll gain real-world experience in security testing and vulnerability assessment.

| Index | Name | Difficulty | Tutorial Link |
|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------|-------------------------------------------------------------------------------------------------------------------------------------|
| 01 | [๐Ÿ“– Setting Up Your Kali Linux Environment](https://labex.io/en/tutorials/kali-setting-up-your-kali-linux-environment-552195) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/kali-setting-up-your-kali-linux-environment-552195) |
| 02 | [๐Ÿ“– Navigating and Managing Files in Kali](https://labex.io/en/tutorials/kali-navigating-and-managing-files-in-kali-552194) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/kali-navigating-and-managing-files-in-kali-552194) |
| 03 | [๐Ÿ“– Basic Networking Tools in Kali](https://labex.io/en/tutorials/kali-basic-networking-tools-in-kali-552191) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/kali-basic-networking-tools-in-kali-552191) |
| 04 | [๐Ÿ“– Exploring Kaliโ€™s Security Tools](https://labex.io/en/tutorials/kali-exploring-kali-s-security-tools-552192) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/kali-exploring-kali-s-security-tools-552192) |
| 05 | [๐Ÿ“– Managing Users and System in Kali](https://labex.io/en/tutorials/kali-managing-users-and-system-in-kali-552193) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/kali-managing-users-and-system-in-kali-552193) |
| 06 | [๐Ÿ“– Learn Nmap Installation and Basic Usage](https://labex.io/en/tutorials/nmap-learn-nmap-installation-and-basic-usage-415924) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-learn-nmap-installation-and-basic-usage-415924) |
| 07 | [๐Ÿ“– Learn Nmap Basic Command Syntax](https://labex.io/en/tutorials/nmap-learn-nmap-basic-command-syntax-415919) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-learn-nmap-basic-command-syntax-415919) |
| 08 | [๐Ÿ“– Learn Nmap Scanning and Output Analysis](https://labex.io/en/tutorials/nmap-learn-nmap-scanning-and-output-analysis-415926) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-learn-nmap-scanning-and-output-analysis-415926) |
| 09 | [๐Ÿ“– Learn Target Specification Techniques in Nmap](https://labex.io/en/tutorials/nmap-learn-target-specification-techniques-in-nmap-415935) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-learn-target-specification-techniques-in-nmap-415935) |
| 10 | [๐Ÿ“– Explore Nmap Verbosity Levels for Network Scanning](https://labex.io/en/tutorials/nmap-explore-nmap-verbosity-levels-for-network-scanning-415939) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-explore-nmap-verbosity-levels-for-network-scanning-415939) |
| 11 | [๐Ÿ“– Conduct Nmap SYN Scans for Network Security](https://labex.io/en/tutorials/nmap-conduct-nmap-syn-scans-for-network-security-415934) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-conduct-nmap-syn-scans-for-network-security-415934) |
| 12 | [๐Ÿ“– Perform UDP Port Scanning with Nmap](https://labex.io/en/tutorials/nmap-perform-udp-port-scanning-with-nmap-415938) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-perform-udp-port-scanning-with-nmap-415938) |
| 13 | [๐Ÿ“– Learn Nmap OS and Version Detection Techniques](https://labex.io/en/tutorials/nmap-learn-nmap-os-and-version-detection-techniques-415925) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-learn-nmap-os-and-version-detection-techniques-415925) |
| 14 | [๐Ÿ“– Install Configure and Analyze Network Traffic with Wireshark](https://labex.io/en/tutorials/wireshark-install-configure-and-analyze-network-traffic-with-wireshark-415947) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-install-configure-and-analyze-network-traffic-with-wireshark-415947) |
| 15 | [๐Ÿ“– Explore and Customize Wireshark Interface](https://labex.io/en/tutorials/wireshark-explore-and-customize-wireshark-interface-415949) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-explore-and-customize-wireshark-interface-415949) |
| 16 | [๐Ÿ“– Capture and Analyze Network Traffic with Wireshark](https://labex.io/en/tutorials/wireshark-capture-and-analyze-network-traffic-with-wireshark-415956) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-capture-and-analyze-network-traffic-with-wireshark-415956) |
| 17 | [๐Ÿ“– Analyze Network Traffic with Wireshark Display Filters](https://labex.io/en/tutorials/wireshark-analyze-network-traffic-with-wireshark-display-filters-415944) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-analyze-network-traffic-with-wireshark-display-filters-415944) |
| 18 | [๐Ÿ“– Apply Wireshark Capture Filters for Network Traffic Analysis](https://labex.io/en/tutorials/wireshark-apply-wireshark-capture-filters-for-network-traffic-analysis-415940) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-apply-wireshark-capture-filters-for-network-traffic-analysis-415940) |
| 19 | [๐Ÿ“– Create and Apply Colorizing Rules in Wireshark](https://labex.io/en/tutorials/wireshark-create-and-apply-colorizing-rules-in-wireshark-415941) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-create-and-apply-colorizing-rules-in-wireshark-415941) |
| 20 | [๐Ÿ“– Analyze TCP Traffic with Wireshark Follow TCP Stream Feature](https://labex.io/en/tutorials/wireshark-analyze-tcp-traffic-with-wireshark-follow-tcp-stream-feature-415946) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-analyze-tcp-traffic-with-wireshark-follow-tcp-stream-feature-415946) |
| 21 | [๐Ÿ“– Export Packets from Wireshark](https://labex.io/en/tutorials/wireshark-export-packets-from-wireshark-415945) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-export-packets-from-wireshark-415945) |
| 22 | [๐Ÿ“– Analyze IPv6 Traffic with Wireshark](https://labex.io/en/tutorials/wireshark-analyze-ipv6-traffic-with-wireshark-415950) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-analyze-ipv6-traffic-with-wireshark-415950) |
| 23 | [๐Ÿ“– Use Tshark for Network Traffic Analysis](https://labex.io/en/tutorials/wireshark-use-tshark-for-network-traffic-analysis-415942) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/wireshark-use-tshark-for-network-traffic-analysis-415942) |
| 24 | [๐Ÿ“– Install and Verify Hydra](https://labex.io/en/tutorials/hydra-install-and-verify-hydra-549917) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/hydra-install-and-verify-hydra-549917) |
| 25 | [๐Ÿ“– Learn Basic Hydra Commands](https://labex.io/en/tutorials/hydra-learn-basic-hydra-commands-549918) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/hydra-learn-basic-hydra-commands-549918) |
| 26 | [๐Ÿ“– Attack HTTP Services with Hydra](https://labex.io/en/tutorials/hydra-attack-http-services-with-hydra-549915) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/hydra-attack-http-services-with-hydra-549915) |
| 27 | [๐Ÿ“– Attack FTP Services with Hydra](https://labex.io/en/tutorials/hydra-attack-ftp-services-with-hydra-549914) | โ˜…โ˜…โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/hydra-attack-ftp-services-with-hydra-549914) |
| 28 | [๐Ÿ“– Attack Telnet Services with Hydra](https://labex.io/en/tutorials/hydra-attack-telnet-services-with-hydra-549916) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/hydra-attack-telnet-services-with-hydra-549916) |
| 29 | [๐Ÿ“– Adjust Hydra Attack Speed and Threads](https://labex.io/en/tutorials/hydra-adjust-hydra-attack-speed-and-threads-549913) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/hydra-adjust-hydra-attack-speed-and-threads-549913) |
| 30 | [๐Ÿ“– Kali Reconnaissance with Nmap and DNS](https://labex.io/en/tutorials/kali-kali-reconnaissance-with-nmap-and-dns-552298) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/kali-kali-reconnaissance-with-nmap-and-dns-552298) |
| 31 | [๐Ÿ“– Kali Vulnerability Scanning with Nikto](https://labex.io/en/tutorials/kali-kali-vulnerability-scanning-with-nikto-552301) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/kali-kali-vulnerability-scanning-with-nikto-552301) |
| 32 | [๐Ÿ“– Perform Penetration Testing with Nmap in Kali Linux](https://labex.io/en/tutorials/nmap-perform-penetration-testing-with-nmap-in-kali-linux-416116) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-perform-penetration-testing-with-nmap-in-kali-linux-416116) |
| 33 | [๐Ÿ“– Perform Penetration Testing with Nmap and Metasploit](https://labex.io/en/tutorials/nmap-perform-penetration-testing-with-nmap-and-metasploit-416117) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-perform-penetration-testing-with-nmap-and-metasploit-416117) |
| 34 | [๐Ÿ“– Perform Information Gathering with Nmap](https://labex.io/en/tutorials/nmap-perform-information-gathering-with-nmap-416118) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-perform-information-gathering-with-nmap-416118) |
| 35 | [๐Ÿ“– Explore Metasploit Framework Basics](https://labex.io/en/tutorials/explore-metasploit-framework-basics-416119) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/explore-metasploit-framework-basics-416119) |
| 36 | [๐Ÿ“– Use Nmap and Metasploit for Network Scanning and Vulnerability Analysis](https://labex.io/en/tutorials/nmap-use-nmap-and-metasploit-for-network-scanning-and-vulnerability-analysis-416120) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-use-nmap-and-metasploit-for-network-scanning-and-vulnerability-analysis-416120) |
| 37 | [๐Ÿ“– Use Nmap to Scan and Exploit Target Host Vulnerabilities](https://labex.io/en/tutorials/nmap-use-nmap-to-scan-and-exploit-target-host-vulnerabilities-416121) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-use-nmap-to-scan-and-exploit-target-host-vulnerabilities-416121) |
| 38 | [๐Ÿ“– Perform Vulnerability Scanning and Penetration Testing with Nmap in Kali Linux](https://labex.io/en/tutorials/nmap-perform-vulnerability-scanning-and-penetration-testing-with-nmap-in-kali-linux-416122) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-perform-vulnerability-scanning-and-penetration-testing-with-nmap-in-kali-linux-416122) |
| 39 | [๐Ÿ“– Develop a Metasploit Scanner in Nmap](https://labex.io/en/tutorials/nmap-develop-a-metasploit-scanner-in-nmap-416123) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-develop-a-metasploit-scanner-in-nmap-416123) |
| 40 | [๐Ÿ“– Exploit Ingreslock Vulnerability with Nmap](https://labex.io/en/tutorials/nmap-exploit-ingreslock-vulnerability-with-nmap-416124) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-exploit-ingreslock-vulnerability-with-nmap-416124) |
| 41 | [๐Ÿ“– Exploit Samba Vulnerability on Metasploitable2 with Nmap](https://labex.io/en/tutorials/nmap-exploit-samba-vulnerability-on-metasploitable2-with-nmap-416125) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-exploit-samba-vulnerability-on-metasploitable2-with-nmap-416125) |
| 42 | [๐Ÿ“– Exploit Unreal IRCd Vulnerability with Nmap and Metasploit](https://labex.io/en/tutorials/nmap-exploit-unreal-ircd-vulnerability-with-nmap-and-metasploit-416126) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-exploit-unreal-ircd-vulnerability-with-nmap-and-metasploit-416126) |
| 43 | [๐Ÿ“– Perform Brute-Force Attacks on SSH and VNC with Metasploit in Nmap](https://labex.io/en/tutorials/nmap-perform-brute-force-attacks-on-ssh-and-vnc-with-metasploit-in-nmap-416127) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-perform-brute-force-attacks-on-ssh-and-vnc-with-metasploit-in-nmap-416127) |
| 44 | [๐Ÿ“– Conduct Penetration Testing on Metasploitable2 with Nmap](https://labex.io/en/tutorials/nmap-conduct-penetration-testing-on-metasploitable2-with-nmap-416128) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-conduct-penetration-testing-on-metasploitable2-with-nmap-416128) |
| 45 | [๐Ÿ“– Perform Privilege Escalation on Linux Machine with Nmap](https://labex.io/en/tutorials/nmap-perform-privilege-escalation-on-linux-machine-with-nmap-416129) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-perform-privilege-escalation-on-linux-machine-with-nmap-416129) |
| 46 | [๐Ÿ“– Exploit Tomcat Vulnerabilities with Nmap in Kali Linux](https://labex.io/en/tutorials/nmap-exploit-tomcat-vulnerabilities-with-nmap-in-kali-linux-416130) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-exploit-tomcat-vulnerabilities-with-nmap-in-kali-linux-416130) |
| 47 | [๐Ÿ“– Exploit NFS Misconfiguration for Root Access with Nmap](https://labex.io/en/tutorials/nmap-exploit-nfs-misconfiguration-for-root-access-with-nmap-416131) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-exploit-nfs-misconfiguration-for-root-access-with-nmap-416131) |
| 48 | [๐Ÿ“– Exploit FTP Service Vulnerabilities with Nmap and Metasploit](https://labex.io/en/tutorials/nmap-exploit-ftp-service-vulnerabilities-with-nmap-and-metasploit-416132) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-exploit-ftp-service-vulnerabilities-with-nmap-and-metasploit-416132) |
| 49 | [๐Ÿ“– Exploit Telnet Service Vulnerability with Metasploit](https://labex.io/en/tutorials/nmap-exploit-telnet-service-vulnerability-with-metasploit-416133) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-exploit-telnet-service-vulnerability-with-metasploit-416133) |
| 50 | [๐Ÿ“– Inject Windows Backdoor into Adobe PDF in Nmap](https://labex.io/en/tutorials/nmap-inject-windows-backdoor-into-adobe-pdf-in-nmap-416134) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/nmap-inject-windows-backdoor-into-adobe-pdf-in-nmap-416134) |
| 51 | [๐Ÿ“– Create Backdoor and Clear Traces on Target Machine in Nmap](https://labex.io/en/tutorials/create-backdoor-and-clear-traces-on-target-machine-in-nmap-416135) | โ˜…โ˜†โ˜† | [๐Ÿ”— View](https://labex.io/en/tutorials/create-backdoor-and-clear-traces-on-target-machine-in-nmap-416135) |

## More

- ๐Ÿ”— [Kali Linux Learn more about](https://labex.io/en/skilltrees/kali)
- ๐Ÿ”— [Awesome Programming Courses](https://github.com/labex-labs/awesome-programming-courses)
- ๐Ÿ”— [Awesome Programming Projects](https://github.com/labex-labs/awesome-programming-projects)