As you can see, in the following screenshot, there is a status bar at the top, and toward the end (on the left-hand side of the Applications menu), there is an Applications tab to access all of the applications that come preinstalled with Kali Linux. These are divided into categories, in terms of the type of attack that they allow you to carry out. We can see the following: 01 – Information Gathering, 02 – Vulnerability Analysis, 03 – Web Applications Analysis, 04 – Databases Assessment, 08 – Exploitation Tools, and 07 – Reverse Engineering. These are all types of applications that can be used for penetration testing:
The ...