Kali Linux 2026.1 is now available and comes with new ones that seek both to polish visual experience and to expand the arsenal of tools for cybersecurity professionals. This version points to the annual pulse of the project: update the appearance, internal improvements and a utility package designed for network teaching, intrusion tests and network security audits.
The Kali team has incorporated dozens of package and system kernel changes into this release: new packages were introduced and hundreds of updates were applied, as well as updating the core to the 6.18 series. If you want to review the technical details of the kernel, the official information is available at kernel.org, and the full announcement of the launch date and the change log is published on Kali's official blog on kali.org.

Among the tools that are integrated into the network repositories are projects aimed at the simulation of adversaries, atomic load tests, wireless network audit, advanced debugging and detection of web vulnerabilities. Among the most relevant additions are AdaptixC2 an extensive platform for post-exploitation and adverse emulation; Atomic-Operator which facilitates the execution of Atomic Red Team tests in heterogeneous environments; and Fluxion, known for its focus on network audit and social engineering techniques in Wi-Fi environments. Also add tools like GEF to improve the experience with GDB, MetasploitMCP for Metasploit MCP services, SSTImap for automated SSTI detection, WPProbe for quick listing of WordPress plugins and XSSstrike for advanced XSS scanning. These additions reflect Kali's orientation to current workflows in offensive security and web audit.
The visual aspect also receives attention. As it is already tradition in annual updates .1, Kali features a "face wash" ranging from new wallpapers to retouches in the graphic installer and improvements in the start-up experience and login screen. The team describes this renewal as an evolution of the environment from the first moment the system starts, with a series of aesthetic and functional elements designed to give a sense of polishing and modernity. You can see more details and catches at the official entrance: Kali Linux 2026.1 release.
A nostalgic curiosity included in this edition is the new option of "BackTrack mode" in Kali-Undercover. Kali-Undercover emerged as a function to camouflage the environment by making the interface look like Windows; with the new modality users can quickly transform their desktop to emulate the appearance of BackTrack 5, the predecessor distribution of Kali. It is an aesthetic but also practical tool for those who handle different environments or want to recover classical aesthetics. It can be activated from the menu or running the corresponding command in terminal.
In the section of mobile devices and embedded hardware, Kali NetHunter continues to receive improvements. The team has corrected known problems (such as WPS scan failures and "back" button behavior) and added HID-related permissions checks to improve stability and security on compatible devices. More information about NetHunter is available at the official store: Kali NetHunter.
If you already use Kali and want to jump to the new launch, the recommended route is to keep the rolling branch and update the system repositories to apply all new packages and corrections. A typical line to point to the rolling repository and launch the update would be to add the official Kali origin, update the index and run a complete system update, with the option to copy the user configuration templates and restart if the system requires it. For new facilities or for downloading ready-to-start images, visit the Kali download page at get-kali or check the images in cdimage.kali.org.

For those who use Kali under Windows Subsystem for Linux, the recommendation remains to migrate to WSL 2 to get better support for graphic applications and overall performance; Microsoft maintains an installation and migration guide in the official documentation of WSL.
An important reminder: Kali is a distribution oriented to security professionals and students acting within a legal and ethical framework. The tools included can be used both to evaluate and strengthen defenses and, in the wrong hands, for malicious activities. Using them without authorization is illegal and dangerous; it always acts with explicit permits and respect for existing regulations.
If you want to deepen the concrete changes of this version, the full changelog and release notes are published by the Kali team on their official website: see the changelog at kali.org. With each update, Kali reaffirms its commitment to be a modern tool box for offensive security, while taking care of visual experience and compatibility with diverse hardware, from Raspberry Pi to NetHunter devices.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...