Listing Thumbnail

    Kali Linux with support by AskforCloud LLC

     Info
    Deployed on AWS
    AWS Free Tier
    This product has charges associated with it for support.Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.

    Overview

    This is a repackaged open source software product wherein additional charges apply for support and maintenance by AskforCloud LLC.

    Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. It does this by providing common tools, configurations, and automations which allows the user to focus on the task that needs to be completed, not the surrounding activity.

    Kali Linux contains industry specific modifications as well as several hundred tools targeted towards various Information Security tasks, such as Penetration Testing, Security Research, Computer Forensics, Reverse Engineering, Vulnerability Management and Red Team Testing.

    Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.

    Kali Linux Features:

    • More than 600 penetration testing tools included.
    • Free and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
    • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see.
    • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
    • Completely customizable
    • Wide-ranging wireless device support

    Disclaimer: This Virtual machine offer contains free and open source software. All the softwares, trademarks used in the Virtual machine offer are the exclusive property of their respective owners. Askforcloud LLC does not offer commercial license of the product mentioned above.

    Highlights

    • Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering.
    • Kali Linux is a multi-platform solution, accessible and freely available to information security professionals and hobbyists.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux Kali Linux

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Kali Linux with support by AskforCloud LLC

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (447)

     Info
    • ...
    Dimension
    Cost/hour
    t2.medium
    Recommended
    $0.10
    t3.micro
    AWS Free Tier
    $0.01
    t2.micro
    AWS Free Tier
    $0.01
    c5n.4xlarge
    $0.30
    c6a.24xlarge
    $1.00
    m6a.large
    $0.10
    x1e.xlarge
    $0.10
    r5a.2xlarge
    $0.10
    d3en.8xlarge
    $0.60
    t2.2xlarge
    $0.10

    Vendor refund policy

    For this offer, Askforcloud LLC does not offer refund, you can cancel at anytime.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Additional details

    Usage instructions

    Resources

    Vendor resources

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Log Analysis, Monitoring
    Top
    100
    In Backup & Recovery

    Overview

     Info
    AI generated from product descriptions
    Penetration Testing Tools
    Comprehensive suite of over 600 specialized tools for security assessment and vulnerability identification
    Linux Distribution Architecture
    Debian-based open-source operating system with advanced security and forensics capabilities
    Platform Compatibility
    Multi-platform solution supporting various hardware and virtualization environments
    Security Research Framework
    Integrated configuration and automation for information security tasks including forensics and reverse engineering
    Device Support
    Extensive wireless device compatibility with flexible system configuration options
    Security Tool Collection
    Comprehensive suite of over 2500 pre-installed security and penetration testing tools including Nmap, Metasploit Framework, Wireshark, Aircrack-ng, John the Ripper, and Hydra
    Penetration Testing Capabilities
    Includes specialized tools for information gathering, vulnerability analysis, web application assessment, database assessment, password attacks, and wireless attacks
    Desktop Environment
    XFCE4 Desktop GUI with VNC access providing graphical interface for security testing and analysis
    Operating System Architecture
    Debian-based Linux distribution designed specifically for information security tasks with Filesystem Hierarchy Standard (FHS) compliance
    Security Research Toolset
    Comprehensive toolkit supporting multiple security domains including exploitation, sniffing, spoofing, post-exploitation, forensics, and reverse engineering
    Forensic Analysis Tools
    Comprehensive suite of forensic tools including Autopsy, DC3DD, and Guymager for digital forensics and data recovery
    Network Security Assessment
    Advanced network scanning and vulnerability assessment capabilities using tools like Nmap, Wireshark, and OpenVAS
    Exploitation Framework
    Robust exploitation toolkit with Metasploit Framework, sqlmap, and John the Ripper for identifying and testing system vulnerabilities
    Wireless Network Auditing
    Specialized wireless and Bluetooth assessment tools including Aircrack-ng, Kismet, and Ubertooth for comprehensive network security testing
    Web Application Security
    Integrated web application analysis tools such as Burp Suite, Nikto, and OWASP ZAP for comprehensive web security assessment

    Contract

     Info
    Standard contract

    Customer reviews

    Ratings and reviews

     Info
    4
    2 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    100%
    0%
    0%
    0%
    2 AWS reviews
    |
    15 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Mathews Daniel

    Has accelerated website vulnerability assessments and internal testing with built-in tools and cloud deployments

    Reviewed on Oct 27, 2025
    Review from a verified AWS customer

    What is our primary use case?

    My main use case for Kali Linux  is for security testing, checking websites, security, analyzing malware, and open-source intelligence gathering.

    I have WordPress websites, so I want to identify whether they are vulnerable or not. Kali Linux  has many inbuilt tools such as WPScan, which I can use readily and analyze whether a website is secure or not, and whether the code running on it is up-to-date or has vulnerabilities. I have used it for checking Wi-Fi security, identifying whether the SSIDs are vulnerable to brute-force attacks or any other cracking attempts.

    I have used Kali Linux for penetration testing, bypassing antivirus and gaining access to machines, virtual machines for testing. I have used Metasploit , which is in-built with Kali Linux, and I have utilized many Metasploit  exploits and modules to achieve this.

    What is most valuable?

    Kali Linux has every tool needed to get started in-built, and it comes along with the OS itself. All we need to do is a bit of update and some slight configuration, but everything else is in-built. It doesn't require extensive time configuring things. It's adopted and available everywhere, including cloud, AWS  or Azure , where you can readily deploy the images. It's based on Debian  Linux, which is one of the most user-friendly flavors of Linux, making it very easy to modify or create new modules.

    In my organization, Kali Linux has positively impacted my day-to-day job, where I perform proof of concepts mostly around endpoint security testing or web vulnerability testing. Kali Linux has helped me significantly in simulating penetration testing and other activities. I can pick an exploit from Metasploit or any other Exploit-DB using Kali Linux in-built features. It has saved me considerable time and effort, and since all the tools are open source, I can easily modify and customize them based on my needs.

    What needs improvement?

    Some tools in Kali Linux lack documentation and details on how to use them, which is one area where it can be improved. It's still advertised as a Linux distro used only for security testing, and many of the tools run as root by default or with the highest privileges. If something could be modified to make it more an everyday OS, activating the security testing part and all other modules on a need-to-activate basis would be very beneficial. Additionally, it could be optimized to suit some low-powered machines.

    The UI in Kali Linux could be improved. In the drop-down menus, it takes a while to load. Trimming down the graphics and other animations could focus more on the speed of opening things and menus.

    For how long have I used the solution?

    I have been using Kali Linux for 12 years.

    What do I think about the stability of the solution?

    Kali Linux is stable.

    What do I think about the scalability of the solution?

    Kali Linux is very scalable, and when deployed from the public cloud, it offers every feature available on public cloud scalability as.

    How are customer service and support?

    The customer support for Kali Linux is good. Since most of the tools and other things are community-based, the documentation and other community support are very good.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I previously used Parrot  Linux and BackBox  Linux, but these were not up to the mark for what we expected, so we switched to Kali Linux.

    How was the initial setup?

    I purchased Kali Linux through the AWS Marketplace . My experience with pricing, setup cost, and licensing for Kali Linux has been good. The pricing and the deployment, resource usage are all spot on and clearly defined, making it helpful and useful for me to deploy and calculate costs.

    What about the implementation team?

    I evaluated Parrot , BackBox  Linux, and some options Ubuntu  with custom tools before choosing Kali Linux. We felt Kali Linux was the most versatile solution.

    What was our ROI?

    Kali Linux has provided a very good return on investment. When we needed training for employees, we wanted 20 or 30 instances of Kali Linux. The availability on AWS Marketplace  was helpful for us to spin up the VMs and deploy them readily. Once the need was over, we removed the instances, saving costs. If we had installed it on-premises or through other means, it would have incurred significant money and effort to create the VMs, deploy it on machines, and then delete and format it after use. The fact that it was available on public cloud helped us achieve about an 85% return on investment.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing for Kali Linux has been good. The pricing and the deployment, resource usage are all spot on and clearly defined, making it helpful and useful for me to deploy and calculate costs.

    What other advice do I have?

    I would advise others looking into using Kali Linux to start with the public cloud instances or marketplace deployment if possible, and to utilize the predefined templates and other options. I would advise going through the documentation since most things are documented. Additionally, use the persistent and other forensic modules that help securely delete data after use.

    Kali Linux is a very good project and distro that can be used for multiple applications, including security testing, penetration testing, or even basic learning of information security or IT security.

    I rate Kali Linux eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Gaurav Pratap Singh

    Has improved penetration testing efficiency through pre-installed tools and supports faster secure deployments

    Reviewed on Sep 30, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Kali Linux  is primarily for testing and cybersecurity, specifically for doing penetration testing on applications and network applications that we utilize for network monitoring.

    A specific penetration test I performed using Kali Linux  was for the application related to DDI , which encompasses DNS, DHCP infrastructure, and network monitoring as well as authentication for Cisco ISE , during which I used tools such as Hydra, Nmap , Ncat, and Wireshark  to capture and analyze network packets.

    Kali Linux fits into my team because I mainly work with network tools and focus primarily on DNS; it plays a crucial role in penetration testing and ensuring that my applications are secure against attacks through various cybersecurity criteria.

    What is most valuable?

    The best features Kali Linux offers include its Debian-based architecture and being open source, which is important for many reasons, such as allowing for live USB boot and custom ISOs, making penetration testing simpler with comprehensive pre-installed toolsets such as Nmap , useful for vulnerability scanning.

    The live USB and custom ISO options help me specifically as they allow for quick access to a wide selection of pre-installed security tools, saving me time on installations and configurations through live USB boot functionality, which lets me get up and running quickly.

    The integration of cloud and containers within Kali Linux is something I wish more people knew about, as it allows for utilizing containerized versions that provide scalability and eliminate the need for a virtual machine setup.

    Kali Linux has positively impacted my organization by improving efficiency in penetration testing; its open-source nature permits extensive customization and inclusion of numerous comprehensive pre-installed tools, contributing to a secure network environment with effective monitoring of network applications.

    The outcomes from using Kali Linux in our organization are significant; we experienced reduced cybersecurity attacks and improved application security, leading to decreased attack surfaces and quicker testing cycles that enabled faster launches and installations.

    What needs improvement?

    There are areas for improvement in Kali Linux, particularly regarding its use of the Linux kernel, which requires external additional patching, and the fact that network services are disabled by default, which complicates usage; enhancing user-friendliness through more GUI-based tools and better integration could be beneficial.

    While Kali Linux is open source, it lacks vendor support, and I believe that improving documentation and community engagement is essential, making it more user-friendly and encouraging the use of GUI tools can significantly enhance the overall experience.

    For how long have I used the solution?

    I have been using Kali Linux for around five years, starting in 2018 or 2019, and I continue to use it until 2024, with plans to keep using Kali Linux starting in January 2025.

    Which solution did I use previously and why did I switch?

    Before switching to Kali Linux, we used Fedora for penetration testing. The decision to move to Kali Linux was influenced by its open-source nature, which reduced costs while facilitating easier automation with DevOps tools.

    What was our ROI?

    Integrating Kali Linux with DevOps tools has resulted in reduced operational costs due to automated test cases, making it a worthwhile investment with significant returns by decreasing the attack surface area and the frequency of attack incidents.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup costs, and licensing for Kali Linux has been positive, as it operates under an open-source model with setup costs primarily related to hardware and virtual machines, eliminating the need for vendor-specific licenses.

    Which other solutions did I evaluate?

    We evaluated alternatives to Kali Linux, including Parrot  OS, BlackArch, BackBox , and the Network Security Toolkit (NST), but Kali Linux was chosen for its stability, open-source nature, and strong community support.

    What other advice do I have?

    Kali Linux's scalability is commendable; it allows for easy expansion through containerized versions and custom ISOs, although support is primarily dependent on the community rather than vendor assistance.

    My advice for others looking into using Kali Linux is to ensure they have a strong foundation in Linux knowledge and are familiar with the various toolsets available within Kali Linux so that they can select the right tools for their specific needs.

    I believe Kali Linux is a valuable open-source tool with great potential for growth through community involvement, and continuous development can enhance its position as a leading solution for penetration testing.

    On a scale of one to ten, I rate Kali Linux an eight out of ten.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Aditya Pillai

    Has helped me learn penetration testing through hands-on tasks and faster workflows

    Reviewed on Sep 27, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I mainly use Kali Linux  for educational purposes, such as learning pen testing and Linux fundamentals.

    I have been using Kali Linux  for the TryHackMe section and applying that learning into different automated scenarios of pen testing that are available on the TryHackMe website.

    I haven't used Kali Linux for my organization, only for my learning purposes.

    What is most valuable?

    Since Kali Linux is a security-focused Linux distro, that would be its main advantage compared to Ubuntu  or Arch Linux.

    The overall focus on security in Kali Linux is what I find most useful.

    TryHackMe has an inbuilt Linux distro for doing the assigned tasks, but sometimes network issues may arise or lag may occur. I use Kali Linux because it is fast and there are no hindrances. It provides quick results and helps me gain a deeper understanding of how something works.

    What needs improvement?

    It would be helpful if Kali Linux could be involved in more systems or laptops. Windows is a standard for many laptops and comes pre-installed on many devices available in the market. If Kali Linux could do the same and increase their reach to better areas, it would be beneficial.

    They could improve Kali Linux's UI/UX. They have been following a standard UI/UX. They could add more options, similar to how CachyOS distro of Arch Linux has many different UI options to select from. Making Kali Linux more customizable would allow users to personalize it to their style.

    Many users utilize Kali Linux through virtual machines. Sometimes Kali Linux has issues detecting hardware such as inbuilt or external Wi-Fi adapters. Improving device detection would be beneficial.

    For how long have I used the solution?

    I have been using Kali Linux for a couple of years.

    What do I think about the stability of the solution?

    Kali Linux is pretty stable.

    What do I think about the scalability of the solution?

    With enough resources, Kali Linux can handle enough tasks.

    Which solution did I use previously and why did I switch?

    I used Ubuntu  before. I wasn't aware of Kali Linux when I first started. I was using Ubuntu for learning about cybersecurity and pen testing. Then I discovered Kali Linux.

    I compared Ubuntu and Kali Linux, as there weren't many security-focused Linux distros available.

    How was the initial setup?

    Kali Linux is free software, an operating system that's available to download without any cost or licensing fees.

    What was our ROI?

    Kali Linux has helped me learn faster and understand concepts better. You get a sense of appreciation when completing tasks on your own machine without help or hints from available tools or operating systems, with minimal guidance.

    I have saved time by avoiding the lag I sometimes face on the TryHackMe in-built machine, and I have learned more efficiently.

    What's my experience with pricing, setup cost, and licensing?

    Kali Linux is free software, an operating system that's available to download without any cost or licensing fees.

    What other advice do I have?

    Other than increasing my knowledge of the Linux distro, Kali Linux has helped me in automated scenarios and increased my knowledge in cybersecurity pen testing. I am still learning.

    I would recommend starting with Ubuntu, learning basic Linux commands and Linux-related knowledge, including Debian . Then make the switch to Kali Linux when ready, starting with small tasks before moving on to bigger things.

    On a scale of 1-10, I rate Kali Linux an 8.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    NilutpalDutta

    Provides valuable real-time data scanning for vulnerability assessment

    Reviewed on Aug 29, 2025
    Review from a verified AWS customer

    What is our primary use case?

    We have some entirely backend services that function as an integration layer, where multiple applications exchange data through it. For any frontend and API control such as Acunetix  or Qualys, they are not supported for those kinds of backend services. For that purpose, we are using Kali Linux . Kali Linux  has the capability of real-time data scanning for vulnerability assessment for backend services. That is actually very far more valuable.

    For backend service, Kali Linux is a very good tool, so I can recommend it for that.

    What is most valuable?

    Kali Linux has the capability of real-time data scanning for vulnerability assessment for backend services. That is actually very far more valuable.

    The toolset on the security framework in Kali Linux is fulfilling our purpose of doing the assessment. We are good with that.

    Kali Linux has the capability to expand more.

    What needs improvement?

    We don't know if Kali Linux has the port scanning capability yet, but that is an area of improvement because we are working with DMZ zones and customized ports. If we can add featured customized port scanning and DMZ zone capability, then it will be a very great tool. It might be there, but we are not exploring it yet.

    We are not exploring 100% of Kali Linux capabilities. If real-time customized port scanning can be added, for example, instead of a default port such as 8080 or 443, if we can use a customized port such as 9876, that capability would be great.

    The only point that I didn't find on Kali Linux for now is the ability to customize port scanning.

    For how long have I used the solution?

    It has been only five to six months, and the team is getting used to it now.

    What do I think about the stability of the solution?

    I should rate the stability of the product as average, good. I would rate it eight, minus two because I don't know about other capabilities.

    What do I think about the scalability of the solution?

    Kali Linux has the capability to expand more, so I would rate it nine.

    Which solution did I use previously and why did I switch?

    I won't compare Kali Linux with Linux from other vendors because we are installing it on top of Red Hat.

    How was the initial setup?

    The initial setup of Kali Linux is okay—not pretty complex or very simple.

    It could be simplified from Kali's side for a GUI user, but if we are doing it as command mode, it is okay. We don't find it very hard to install or pretty complex.

    For a regular user, they might find it complex. For the technical staff, it's not very complex.

    What about the implementation team?

    Our DevOps team is doing it, so it is somewhat customized.

    Which other solutions did I evaluate?

    I won't compare Kali Linux with Linux from other vendors because we are installing it on top of Red Hat. We can say the competitors of Acunetix , such as Burp  Suite and Qualys Guard, those are the real competitors. Kali Linux is good because Sysbench is one kind of tool that has the capability of port scanning, but we don't know much about Sysbench as of now.

    What other advice do I have?

    We are not working with the multi-language support function as of now because we are very new to it, so we are exploring the stuff entirely.

    We are not working with the resource constrainer system function. We just use scanning for incoming and outgoing data services as of now.

    We are not exploring 100% of Kali Linux capabilities. If real-time customized port scanning can be added, for example, instead of a default port such as 8080 or 443, if we are able to use a customized port such as 9876, that capability would be great.

    I prefer not to comment further because we are very new to the tool. We don't explore 100%, so I can't comment on it with my capacity right now.

    I'm not sure about the pricing model because we got a community version of Kali Linux. The customer has purchased it, so I'm not sure about the pricing.

    On a scale of one to ten, I rate Kali Linux an eight.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    GurpreetSingh4

    Has small footprint and low maintenance cycles

    Reviewed on Jun 03, 2024
    Review provided by PeerSpot

    What is our primary use case?

    In general, Kali Linux is used for hosting applications, developing new applications, and operating systems. It's also used in containers and nodes. The tool offers a smaller footprint than Windows because it lacks the functionality of graphical user interfaces. One advantage of Kali Linux is its lower maintenance requirements than Windows, with slower update cycles and easier maintenance procedures.

    What is most valuable?

    The tool's most valuable features are low maintenance and stability. 

    What needs improvement?

    The tool is already stable and well-developed, so there's minimal feedback for enhancement or change. However, it should improve security, which is crucial, especially with the increasing use of Kali Linux in cloud environments.

    For how long have I used the solution?

    I have been using the product for a few months. 

    What do I think about the stability of the solution?

    I rate the tool's stability a ten out of ten.

    What do I think about the scalability of the solution?

    Kali Linux is scalable and has a smaller footprint. It can be run on multiple instances of your applications.

    How are customer service and support?

    We have community support. I haven't faced any problems with support. 

    How was the initial setup?

    The tool's deployment is quick and straightforward compared to Windows. It takes about five to ten minutes to complete. 

    What's my experience with pricing, setup cost, and licensing?

    Kali Linux offers a perpetual license, meaning you pay for it once and can use it. While free versions of Linux are available, Kali Linux, being an enterprise edition, usually comes with a perpetual license. I rate its pricing a five out of ten. 

    What other advice do I have?

    Pre-installed tools can provide basic training and security measures, which is helpful. However, these tools may not be sufficient to secure your workload fully. That's why it's important to complement them with other specialized security tools to enhance your overall security.

    Before using Kali Linux, make sure you know its pros and cons. It's a good system to learn because it's the best choice for some situations. It has default firewall settings that block everything by default. It's up to the user to decide how much they want to open up.       

    Learning Kali Linux takes time because it relies on command-line tasks instead of graphical interfaces. Practice is key to becoming comfortable with it.

    View all reviews