From bf0fd62bffbe3fea7d1c075159f02d17bbd82650 Mon Sep 17 00:00:00 2001 From: roadmap bot <135830415+roadmap-bot@users.noreply.github.com> Date: Thu, 6 Jul 2023 08:39:16 +0100 Subject: [PATCH] chore: add resource under cyber-security:security-skills-and-knowledge:common-distros-for-hacking:kali-linux --- .../common-distros-for-hacking/101-kali-linux.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md index 7e65d4cd7..17a5207c6 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md +++ b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/common-distros-for-hacking/101-kali-linux.md @@ -38,3 +38,5 @@ While Kali Linux is widely used and respected in the cybersecurity community, it ## Conclusion Kali Linux is a powerful and widely used distribution tailored for cybersecurity experts and penetration testers. Its extensive collection of tools, combined with regular updates and customization options, make it an attractive choice for those seeking a reliable and feature-rich operating system geared towards cybersecurity tasks. However, it is essential for users to remain mindful of the responsibility and legality associated with using these tools. + +- [kali Linux](https://www.kali.org/) \ No newline at end of file