{"id":3105,"date":"2025-09-24T01:00:48","date_gmt":"2025-09-24T01:00:48","guid":{"rendered":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/"},"modified":"2025-09-24T01:00:48","modified_gmt":"2025-09-24T01:00:48","slug":"kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing","status":"publish","type":"post","link":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/","title":{"rendered":"Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing"},"content":{"rendered":"<p>Offensive Security has officially announced the release of Kali Linux 2025.3, marking it as the third update of this Debian-based distribution aimed at ethical hacking and penetration testing in 2025. This version comes over three months after the previous update, 2025.2, and introduces ten new hacking tools to enhance user capabilities.<\/p>\n<p>One significant addition is the Nexmon support, which brings \u201cpatched\u201d firmware for certain wireless chips, enabling monitor mode and injection mode for the built-in Wi-Fi on Raspberry Pi devices. The update also extends support to Raspberry Pi 5, while other devices can also utilize Nexmon.<\/p>\n<p>The new hacking tools included in Kali Linux 2025.3 are notable:<\/p>\n<ul>\n<li><strong>Caido<\/strong> and <strong>Caido-cli<\/strong>: Web security auditing tools.<\/li>\n<li><strong>Detect It Easy (DiE)<\/strong>: A file type identification tool.<\/li>\n<li><strong>Gemini CLI<\/strong>: An open-source AI agent that integrates with the terminal.<\/li>\n<li><strong>Ligolo-mp<\/strong>: A solution for multiplayer pivoting.<\/li>\n<li><strong>Vwifi-dkms<\/strong>: A tool for managing &quot;dummy&quot; Wi-Fi networks.<\/li>\n<li><strong>Krbrelayx<\/strong>: A toolkit for Kerberos relaying and unconstrained delegation abuse.<\/li>\n<li><strong>LLM-tools-nmap<\/strong>: Facilitates network discovery and security scanning using nmap.<\/li>\n<li><strong>Mcp-kali-server<\/strong>: Connects an AI agent to Kali.<\/li>\n<li><strong>Patchleaks<\/strong>: Identifies security fixes with detailed descriptions for validation or weaponization.<\/li>\n<\/ul>\n<p>In addition to new tools, Kali Linux 2025.3 features a new Xfce panel plugin for quickly checking and copying VPN IP addresses, enhancements for CARsenal and wireless injection in Kali NetHunter, and the removal of support for the ARMel architecture.<\/p>\n<p>Users can download Kali Linux 2025.3 from the <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.kali.org\/get-kali\/\">official website<\/a> in various formats, including versions for 64-bit, ARM, Virtual Machines, Cloud, WSL, and mobile platforms. For existing users, simply updating their installation with <code>sudo apt update &amp;&amp; sudo apt full-upgrade<\/code> will suffice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Offensive Security has officially announced the release of Kali Linux 2025.3, marking it as the third update of this Debian-based distribution aimed at ethical hacking and penetration testing in 2025. This version comes over three months after the previous update, 2025.2, and introduces ten new hacking tools to enhance user capabilities. One significant addition is [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":3106,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,98,99,1189,27,4,100],"tags":[],"class_list":["post-3105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-distros","category-ethical-hacking","category-kali-linux","category-kali-linux-2025-3","category-linux-distribution","category-news","category-penetration-testing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing - ServerHost Hosting Solutions Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing - ServerHost Hosting Solutions Blog\" \/>\n<meta property=\"og:description\" content=\"Offensive Security has officially announced the release of Kali Linux 2025.3, marking it as the third update of this Debian-based distribution aimed at ethical hacking and penetration testing in 2025. This version comes over three months after the previous update, 2025.2, and introduces ten new hacking tools to enhance user capabilities. One significant addition is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"ServerHost Hosting Solutions Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-24T01:00:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/\",\"url\":\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/\",\"name\":\"Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing - ServerHost Hosting Solutions Blog\",\"isPartOf\":{\"@id\":\"https:\/\/serverhost.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/serverhost.com\/blog\/wp-content\/uploads\/2025\/09\/47647c0e-a56f-4832-9e06-4503c05ab6f8.webp\",\"datePublished\":\"2025-09-24T01:00:48+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#primaryimage\",\"url\":\"https:\/\/serverhost.com\/blog\/wp-content\/uploads\/2025\/09\/47647c0e-a56f-4832-9e06-4503c05ab6f8.webp\",\"contentUrl\":\"https:\/\/serverhost.com\/blog\/wp-content\/uploads\/2025\/09\/47647c0e-a56f-4832-9e06-4503c05ab6f8.webp\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/serverhost.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/serverhost.com\/blog\/#website\",\"url\":\"https:\/\/serverhost.com\/blog\/\",\"name\":\"ServerHost Hosting Solutions Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/serverhost.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing - ServerHost Hosting Solutions Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing - ServerHost Hosting Solutions Blog","og_description":"Offensive Security has officially announced the release of Kali Linux 2025.3, marking it as the third update of this Debian-based distribution aimed at ethical hacking and penetration testing in 2025. This version comes over three months after the previous update, 2025.2, and introduces ten new hacking tools to enhance user capabilities. One significant addition is [&hellip;]","og_url":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/","og_site_name":"ServerHost Hosting Solutions Blog","article_published_time":"2025-09-24T01:00:48+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/","url":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/","name":"Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing - ServerHost Hosting Solutions Blog","isPartOf":{"@id":"https:\/\/serverhost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/serverhost.com\/blog\/wp-content\/uploads\/2025\/09\/47647c0e-a56f-4832-9e06-4503c05ab6f8.webp","datePublished":"2025-09-24T01:00:48+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#primaryimage","url":"https:\/\/serverhost.com\/blog\/wp-content\/uploads\/2025\/09\/47647c0e-a56f-4832-9e06-4503c05ab6f8.webp","contentUrl":"https:\/\/serverhost.com\/blog\/wp-content\/uploads\/2025\/09\/47647c0e-a56f-4832-9e06-4503c05ab6f8.webp","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/serverhost.com\/blog\/kali-linux-2025-3-unveiling-10-new-hacking-tools-for-enhanced-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/serverhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Kali Linux 2025.3: Unveiling 10 New Hacking Tools for Enhanced Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/serverhost.com\/blog\/#website","url":"https:\/\/serverhost.com\/blog\/","name":"ServerHost Hosting Solutions Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/serverhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/posts\/3105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/comments?post=3105"}],"version-history":[{"count":0,"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/posts\/3105\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/media\/3106"}],"wp:attachment":[{"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/media?parent=3105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/categories?post=3105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/serverhost.com\/blog\/wp-json\/wp\/v2\/tags?post=3105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}