Offensive Security announced today the release of Kali Linux 2018.3, a new snapshot of the Debian-based ethical hacking and penetration testing operating system.

Download Kali Linux 2018.3

root@kali:~# apt update && apt -y full-upgrade

Type the Above command in terminal to upgrade your Kali Linux

Kali Linux 64 BitHTTP | Torrent3.0G2018.3

Powered by the Linux 4.17 kernel series, Kali Linux 2018.3 adds more fixes for the latest Spectre and Meltdown security vulnerabilities, better power management, improved GPU support, and lots of updated hacking and penetration testing tools, including Aircrack-ng, Burp Suite, OpenVAS, Wifite, and WPScan. A full changelog with all the fixes and updates is available here.

Introducing idb, a tool for iOS research and penetration testing
One of the coolest new features of the Kali Linux 2018.3 release is a new penetration testing tool called idb, which hackers or bug hunters can use for research and penetration testing on Apple’s iOS mobile operating system. Also new are the Kerberoast tools for Kerberos assessment and DataSploit OSINT framework for performing various recon operations.

Kali Linux 2018.3 also includes the GBD – PEDA (Python Exploit Development Assistance for GDB) tools, and you can download the various installation or live images right now through our Linux software portal. Of course, existing users will only have to run the command below to update their installations as Kali Linux follows a rolling release model where you install once and receive updates forever.

New Tools and Tool Upgrades

idb – An iOS research / penetration testing tool
gdb-peda – Python Exploit Development Assistance for GDB
datasploit – OSINT Framework to perform various recon techniques
kerberoast – Kerberos assessment tools
In addition to these new packages, upgraded a number of tools in  repos including aircrack-ng, burpsuite, openvas, wifite, and wpscan.
For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog –


Please enter your comment!
Please enter your name here