
Apr 2, 2013
Kali Linux on a Galaxy Note 10.1
Here at Offsec, we love playing with hardware. Be it something like the Onity Hotel Door Unlocker, a Teensy USB HID attack payload, or RFID hacks – if it’s shiny, we like it. While we were in the last stages of developing Kali Linux, we made the effort to to get Kali working on some ARM hardware, such as the Samsung Chromebook, Odroid U2, Raspberry Pi and RK3306 devices such as the SS808, and then contributed these to the community as “Unofficial Trusted Images”, together with the Official Kali Linux downloads.
Here at Offsec, we love playing with hardware. Be it something like the Onity Hotel Door Unlocker, a Teensy USB HID attack payload, or RFID hacks – if it’s shiny, we like it. While we were in the last stages of developing Kali Linux, we made the effort to to get Kali working on some ARM hardware, such as the Samsung Chromebook, ODROID U2, Raspberry Pi and RK3306 devices such as the SS808, and then contributed these to the community as “Unofficial Trusted Images”, together with the Official Kali Linux downloads.
Last week, we got a Galaxy Samsung Note 10.1 sent to us by a Kali fan, asking us to see if we can get Kali Linux running on it. A few days later, we managed to get Kali Linux installed and running on this tablet and we were all amazed by its general usability. I, for one, had my doubts that a “Tablet Interface” would ever be useful in a real world scenario other than remote SSH access. I was proven very wrong. Although sound and Bluetooth features are not yet functional, you can boot Kali Linux natively on your Galaxy Note relatively easily to test it out. Here’s what you need:
- Rooted Samsung Galaxy Note 10.1.
- At least 7 GB free on your internal SD card.
- Follow the instructions for
Kali on Samsung Galaxy Note 10.1.Note: link to archived page from WayBack machine for 2013 version of NetHunter!
We’ve run nmap scans, metasploit, and a variety of other tools reliably over the wireless connection, and so far – so good. As with all Kali contributed images, there’s no official support for them. We put them out for the community to experiment with and hopefully improve upon. We still have some more work to do before we make a detailed “build” write-up on the Kali Documentation site. For the impatient, we used the guide at OpenSGN to build our image.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
Jun 5, 2025
2 min read

Insights
OffSec’s Take on the Global Generative AI Adoption Index
Discover OffSec’s take on the latest Global Generative AI Adoption Index report released by AWS.
May 30, 2025
3 min read

Research & Tutorials
CVE-2025-0655 – Remote Code Execution in D-Tale via Unprotected Custom Filters
A critical remote code execution (RCE) vulnerability in the D-Tale data visualization tool was identified which allowed attackers to execute arbitrary system exams, abusing an exposed API endpoint.
May 29, 2025
2 min read