diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md index 7e65d4cd7..17a5207c6 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md +++ b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md @@ -38,3 +38,5 @@ While Kali Linux is widely used and respected in the cybersecurity community, it ## Conclusion Kali Linux is a powerful and widely used distribution tailored for cybersecurity experts and penetration testers. Its extensive collection of tools, combined with regular updates and customization options, make it an attractive choice for those seeking a reliable and feature-rich operating system geared towards cybersecurity tasks. However, it is essential for users to remain mindful of the responsibility and legality associated with using these tools. + +- [kali Linux](https://www.kali.org/) \ No newline at end of file