Integrated Security Toolkit
This guide combines custom Kali Linux installation with C2 framework agent/plugin development to create a comprehensive offensive security toolkit.
Kali Linux Customization
Build a tailored Kali ISO with pre-installed tools, custom user setup, and optimized desktop environment for penetration testing.
C2 Framework Development
Extend your capabilities by developing custom agents and plugins for popular C2 frameworks like Sliver, Havoc, Mythic, and Nimplant.
Part 1: Custom Kali Linux Installation
Goal
Create a Kali Linux ISO with Burp Suite, OWASP ZAP, Nikto pre-installed, non-root sudo user, and XFCE desktop environment.
Pre-installed Tools
- Burp Suite
- OWASP ZAP
- Nikto
Security
- Non-root user
- Sudo privileges
- Hardened config
Desktop
- XFCE environment
- Custom themes
- Optimized UI
Preparing the Environment
Download the Kali Linux ISO and verify its integrity:
wget https://cdimage.kali.org/kali-rolling/amd64/iso/kali-linux-rolling-amd64.iso
sha256sum kali-linux-rolling-amd64.iso
Best Practices
- Always verify ISO checksum
- Use VM for initial tests before bare metal
- Consider using Ventoy for multi-ISO USB
Customizing Kali ISO with live-build
Install live-build and set up the configuration:
sudo apt install live-build
git clone https://gitlab.com/kalilinux/packages/live-build-config.git
cd live-build-config
cp -r config config-custom
Best Practices
- Create a custom config directory
- Edit
config/package-lists/kali.list.chrootto add tools - Keep original config as backup