
Apr 2, 2013
Kali Linux on a Galaxy Note 10.1
Here at Offsec, we love playing with hardware. Be it something like the Onity Hotel Door Unlocker, a Teensy USB HID attack payload, or RFID hacks – if it’s shiny, we like it. While we were in the last stages of developing Kali Linux, we made the effort to to get Kali working on some ARM hardware, such as the Samsung Chromebook, Odroid U2, Raspberry Pi and RK3306 devices such as the SS808, and then contributed these to the community as “Unofficial Trusted Images”, together with the Official Kali Linux downloads.
Here at Offsec, we love playing with hardware. Be it something like the Onity Hotel Door Unlocker, a Teensy USB HID attack payload, or RFID hacks – if it’s shiny, we like it. While we were in the last stages of developing Kali Linux, we made the effort to to get Kali working on some ARM hardware, such as the Samsung Chromebook, ODROID U2, Raspberry Pi and RK3306 devices such as the SS808, and then contributed these to the community as “Unofficial Trusted Images”, together with the Official Kali Linux downloads.
Last week, we got a Galaxy Samsung Note 10.1 sent to us by a Kali fan, asking us to see if we can get Kali Linux running on it. A few days later, we managed to get Kali Linux installed and running on this tablet and we were all amazed by its general usability. I, for one, had my doubts that a “Tablet Interface” would ever be useful in a real world scenario other than remote SSH access. I was proven very wrong. Although sound and Bluetooth features are not yet functional, you can boot Kali Linux natively on your Galaxy Note relatively easily to test it out. Here’s what you need:
- Rooted Samsung Galaxy Note 10.1.
- At least 7 GB free on your internal SD card.
- Follow the instructions for
Kali on Samsung Galaxy Note 10.1.Note: link to archived page from WayBack machine for 2013 version of NetHunter!
We’ve run nmap scans, metasploit, and a variety of other tools reliably over the wireless connection, and so far – so good. As with all Kali contributed images, there’s no official support for them. We put them out for the community to experiment with and hopefully improve upon. We still have some more work to do before we make a detailed “build” write-up on the Kali Documentation site. For the impatient, we used the guide at OpenSGN to build our image.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2025-29891 – Apache Camel Exploit via CAmelExecCommandArgs Header Injection
Discover how CVE-2025-29891 impacts Apache Camel via CAmelExecCommandArgs header injection. Learn how attackers exploit this misconfiguration for remote code execution and how to secure your systems.
Aug 8, 2025
2 min read

Research & Tutorials
CVE-2025-30208 – Vite Arbitrary File Read via @fs Path Traversal Bypass
Discover CVE-2025-30208, a critical arbitrary file read vulnerability in the Vite development server. Learn how remote attackers exploit @fs URL handling to access sensitive files.
Jul 31, 2025
1 min read

OffSec News
Get Noticed: 5 Cybersecurity Job Hunt Tips
If you’ve already set your heart on your chosen career path, you might understand that getting noticed by the right employer isn’t always straightforward. When we speak with OffSec learners, many will say that getting the first job is the hardest part. Some candidates will spend 6–12 months job-hunting, applying to hundreds of roles with
Jul 31, 2025
5 min read