Kali Linux contains hundreds of tools that are used for penetration testing, forensics, and much more. Navigating through the tools that are built-in, along with the additional tools that are available on the internet, can be a challenging and overwhelming task.
In this section, we will discuss the essential tools that you are likely to use frequently. As you progress through this book, you will learn about additional tools that are either built-in or need to be downloaded. The following list is just a drop in the ocean, so to speak; you can expect to see more of these tool throughout the book.