Top Rated Kali Linux Alternatives
162 Kali Linux Reviews
Overall Review Sentiment for Kali Linux
Log in to view review sentiment.

It gets the job done. Lots of tools already installed in the OS. Review collected by and hosted on G2.com.
It's a bit gloomy. Can use some better designing. Review collected by and hosted on G2.com.
kali has many python tools easyly installable also free Review collected by and hosted on G2.com.
when using kali linux on the virtualbox, you can see some driver problems Review collected by and hosted on G2.com.

By defaulty Kali Linux has all the tools a hacker could need. There are tools for:
Information Gathering
Vulnertability Analysis
Web Application Analysis
Database Assessment
Password Attacks
Wireless Attacks
Reverse Engineering
Exploitation Tools
Sniffing and Spoofing
Post Exploitation
Forensics
Reporting Tools
Social Engineering Tools
There are really only one or two tools that can match it but none with the number of resources available to help you use them. Review collected by and hosted on G2.com.
If you are running it on bare metal it can be pain to get other applications to run inside Kali. This isn't really a shortycoming of the distribution it's just the way it is designed to be used. It's much better when run from a VM. Review collected by and hosted on G2.com.

It's vast pre-installed applications related to pen-testing allows us to save time in searching and downloading applications. No need to download applications. Very good for using as live on USB and works as intended on it. Review collected by and hosted on G2.com.
A little bit heavier compared to some other linux distro and while very good for a experienced user, can be bad for a new user with no experience with it as it's easy to mistakenly do something you didn't intend to do. Review collected by and hosted on G2.com.

Kali is a simple Linux OS loaded with all the tools you need to get started with ethical hacking, it's easy to get a hang of. It is very helpful, especially for beginners. Review collected by and hosted on G2.com.
There is something about the setup that doesn't click with me, I've run into some issues trying to install Kali Linux OS on my computer and had to restart the entire setup process. Review collected by and hosted on G2.com.

Open Source, Tools which are pre -installed and user interface Review collected by and hosted on G2.com.
Nothing, Kali is best for pentesting and practicing Ethical Hacking Review collected by and hosted on G2.com.

It has got all the frameworks I need, And has a description/tutorial on how to use them. It also has a great community. Review collected by and hosted on G2.com.
I don't understand most of the errors I get when I install frameworks, which exhausts me most of the time Review collected by and hosted on G2.com.
More than 600 penetration-testing tools are included in Kali Linux, many of which are created to make it simpler for network security teams to evaluate the security of their open soruce networks.
Users can locate support files, binaries, and even libraries on any systems that follow the Filesystem Hierarchy Standard, to name just a few. This means that unlike when using a system like BackTrack, we won't need to conduct a manual search for a tool. Just enter the tool's command name in Kali Linux's root terminal.
Although most penetration tools are written in English, Kali provides full multilingual support, allowing more users to operate in their native language and find the necessary tools. Review collected by and hosted on G2.com.
Kali Linux has several drawbacks:
Kali Linux moves a bit more slowly.
There are not many software bugs in Kali Linux.
It is not recommended for those unfamiliar with Linux who want to learn the operating system because Kali Linux focuses on penetration. Review collected by and hosted on G2.com.
With all the tools you will ever need to perform a security Assessment and also available for free to any one this is the best OS for every kind of security analyst. Wether they are freelancer, Students, or professional working as a cyber security analyst. Review collected by and hosted on G2.com.
Honestly I haven't found anythin that would cause me to dislike this OS. With every tool I ever need for a security Assessment this OS helps me do my job efficiently. Review collected by and hosted on G2.com.

The most beautiful things is that every thing is done via command no need to nevigate anything just write a command and boom things happen easily and smoothly Review collected by and hosted on G2.com.
Sometimes commands are not getting correctly so this is not showing suggestions of related commands Review collected by and hosted on G2.com.