Parrot OS · Volume 6

Parrot OS Volume 6 — Tool Inventory and Kali Parity

What ships in Parrot, what Kali has that Parrot doesn't, how to bridge the gap cleanly

Contents

SectionTopic
1The metapackage model on both distros
2Parrot’s parrot-tools-* metapackages — what’s in each
3Kali’s kali-tools-* metapackages — the reference
4Side-by-side category map
5Tools Kali has that Parrot doesn’t
6Tools Parrot has that Kali doesn’t
7Installing the missing pieces cleanly
8Version drift between Parrot and Kali
9The fully-loaded daily-driver: a recommended install set
10Cheatsheet additions

1. The metapackage model on both distros {#metapackage-model}

A metapackage in Debian / APT is a virtual package that depends on a group of other packages — installing it pulls in the whole group. Both Parrot and Kali use metapackages to organize their pentest tooling: instead of remembering “I need nmap, masscan, zmap, naabu, rustscan, unicornscan” for network reconnaissance, you install parrot-tools-network (Parrot) or kali-tools-information-gathering (Kali) and get all of them at once.

The two distros’ metapackage naming conventions diverge — Parrot prefixes with parrot-tools-, Kali with kali-tools- — but the contents substantially overlap. Most categories on one distro map to a clear category on the other.

The Parrot Security Edition ISO comes with most parrot-tools-* metapackages already installed. The Home Edition ships none of them — you’d apt install parrot-tools-full on Home to get the same tool set.

2. Parrot’s parrot-tools-* metapackages — what’s in each {#parrot-tools}

As of Parrot 6.3, the canonical parrot-tools-* metapackages are:

MetapackageContents (representative; not exhaustive)Approx. tool count
parrot-tools-networknmap, masscan, zmap, netcat, hping3, arp-scan, fping, mtr, traceroute, sslscan, sslyze, testssl.sh~30
parrot-tools-websqlmap, nikto, gobuster, dirb, dirbuster, wfuzz, ffuf, burpsuite (community), zaproxy (OWASP ZAP), wpscan, jSQL Injection~40
parrot-tools-wirelessaircrack-ng, kismet, reaver, bully, pixiewps, mdk4, wifite, hcxtools, hcxdumptool, wireshark, bettercap~25
parrot-tools-passwordsjohn (John the Ripper), hashcat, hydra, medusa, ncrack, crunch, cewl, cupp, hash-identifier, hashid~20
parrot-tools-forensicsautopsy, sleuthkit, volatility3, dc3dd, ddrescue, foremost, scalpel, photorec, binwalk, scrounge-ntfs, regripper~30
parrot-tools-reverseghidra, radare2, rizin+cutter, gdb (gef/peda/pwndbg), ltrace, strace, objdump, hex editors (bless, ghex, wxhexeditor), IDA Free~25
parrot-tools-exploitmetasploit-framework, set (Social-Engineer Toolkit), beef-xss, exploitdb, searchsploit, msfpc, mona.py~15
parrot-tools-pwnpwntools (Python), GEF/PEDA/pwndbg GDB plugins, gef-extras, ROPgadget, ropper, one_gadget, libc-database~15
parrot-tools-stresshping3, t50, slowhttptest, goldeneye, hulk, loic, xerxes~10
parrot-tools-snifferwireshark, tcpdump, dsniff, ettercap, mitmproxy, bettercap, sslsplit, sslsniff, urlsnarf, dnschef~20
parrot-tools-vulnopenvas (Greenbone), nikto, lynis, chkrootkit, rkhunter, unhide~15
parrot-tools-anontor, torsocks, proxychains-ng, anonsurf, obfs4proxy, snowflake-client~10
parrot-tools-infotheharvester, recon-ng, maltego (community), spiderfoot, photon, sherlock, holehe, h8mail~20
parrot-tools-cloudaws-cli, gcloud, azure-cli, pacu, cloudgoat, scoutsuite, prowler, cloudsplaining~15
parrot-tools-mobileapktool, jadx, dex2jar, drozer, frida-tools, objection, mobsf~15
parrot-tools-rfidproxmark3, libnfc, mfoc, mfcuk, libnfc-bin~10
parrot-tools-iotmqtt-tools, esptool, avrdude, openocd, j-link tools~10
parrot-tools-malwareclamav, malwarescan, capa, yara~10
parrot-tools-full(transitively depends on everything above)~500+

sudo apt install parrot-tools-<name> to install a category. sudo apt install parrot-tools-full for everything.

After install, the MATE menu’s Pentesting sub-menu groups tools by category (Information Gathering, Vulnerability Analysis, Web Application Analysis, Database Assessment, Password Attacks, Wireless Attacks, Reverse Engineering, Exploitation Tools, Sniffing & Spoofing, Post Exploitation, Forensics, Reporting Tools, Social Engineering Tools).

3. Kali’s kali-tools-* metapackages — the reference {#kali-tools}

For comparison, Kali Linux 2025.x’s catalog:

MetapackageContentsApprox. tool count
kali-tools-top10The 10 most-used (nmap, Metasploit, Burp Suite, sqlmap, Aircrack-ng, John, Hydra, Hashcat, Wireshark, Nikto)10
kali-tools-information-gathering(same as Parrot’s parrot-tools-network + much of parrot-tools-info)~80
kali-tools-vulnerabilityOpenVAS, Nikto, sqlmap, w3af, joomscan, wpscan, etc.~30
kali-tools-web(matches parrot-tools-web)~50
kali-tools-databasesqlmap, sqlite tools, jSQL Injection, sqlninja~10
kali-tools-passwords(matches parrot-tools-passwords)~30
kali-tools-wireless(matches parrot-tools-wireless)~30
kali-tools-reverse-engineeringghidra, radare2, rizin+cutter, gdb plugins, IDA Free~25
kali-tools-exploitationmetasploit, beef-xss, set, exploitdb~20
kali-tools-social-engineeringset, gophish, evilginx2, beef-xss~10
kali-tools-sniffing-spoofing(matches parrot-tools-sniffer)~20
kali-tools-post-exploitationempire/starkiller, mimikatz, BloodHound, Sliver, PowerSploit, weevely~30
kali-tools-forensics(matches parrot-tools-forensics)~30
kali-tools-reportingdradis, faraday, magictree, pipal, casefile~5
kali-tools-rfid(matches parrot-tools-rfid)~10
kali-tools-hardwareesptool, avrdude, openocd, sigrok, j-link~10
kali-tools-windows-resourcesimpacket, responder, mimikatz, evil-winrm, crackmapexec / NetExec~30
kali-tools-crypto-stegohashid, hash-identifier, John, sage, stegcracker, steghide~15
kali-tools-fuzzingafl, american-fuzzy-lop, honggfuzz, wfuzz, ffuf~15
kali-tools-802-11aircrack-ng, mdk4, kismet, pyrit, reaver(subset of wireless)
kali-tools-bluetoothbluez, blueranger, bluelog, bluemaho, btcrack~10
kali-tools-sdrgnuradio, gqrx, gr-osmosdr, rtl-sdr~10
kali-tools-voipsipvicious, voiphopper, sipsak~10
kali-tools-rfidproxmark3, libnfc, mfoc~10
kali-tools-everythingeverything (massive)600+

4. Side-by-side category map {#category-map}

The two distros’ categories don’t map 1:1 — Kali splits more granularly. The functional mapping:

NeedParrot metapackageKali metapackage
Network recon (nmap, masscan)parrot-tools-networkkali-tools-information-gathering
Web app testing (Burp, sqlmap, ffuf)parrot-tools-webkali-tools-web
Wirelessparrot-tools-wirelesskali-tools-wireless + kali-tools-802-11 + kali-tools-bluetooth
Password / hashparrot-tools-passwordskali-tools-passwords
Reverse engineeringparrot-tools-reversekali-tools-reverse-engineering
Exploitationparrot-tools-exploitkali-tools-exploitation
Post-exploitation / lateral movement(subset of parrot-tools-exploit, less complete)kali-tools-post-exploitation (richer)
Windows-specific (impacket, responder, mimikatz, evil-winrm, NetExec)scattered; not a dedicated metapackagekali-tools-windows-resources (well-curated)
Forensicsparrot-tools-forensicskali-tools-forensics
RFID / NFCparrot-tools-rfidkali-tools-rfid
Hardware (microcontrollers, JTAG)parrot-tools-iotkali-tools-hardware
SDRnot metapackaged; apt install gnuradio gqrxkali-tools-sdr
Anonymityparrot-tools-anon (well-curated)(no equivalent; install tor + obfs4proxy manually)
Information gathering / OSINTparrot-tools-infokali-tools-information-gathering
Fuzzing(scattered; afl in main repo)kali-tools-fuzzing
Reportingnot metapackagedkali-tools-reporting

The two big gaps for Parrot users:

  1. kali-tools-windows-resources equivalents (impacket, responder, mimikatz, evil-winrm, NetExec, BloodHound, PowerSploit, Sliver) are not bundled into a single Parrot metapackage. They exist in Parrot’s repos individually, but you install them by name.
  2. kali-tools-post-exploitation equivalents are similarly scattered on Parrot. Empire / Starkiller / Sliver / Cobalt Strike alternatives are individually installable.

5. Tools Kali has that Parrot doesn’t {#kali-only}

In 2026 the actual “Kali-only” gap is narrow — most tools are available in both either via the distro’s own repo or via the upstream developer’s release. The places where Parrot is meaningfully behind:

ToolWhy Kali has it more convenientlyHow to get on Parrot
BloodHound + neo4jKali ships bloodhound metapackage; Parrot requires manual neo4j install and BloodHound binary downloadapt install neo4j + download BloodHound from https://github.com/BloodHoundAD/BloodHound/releases
Sliver C2Kali ships sliver package; Parrot doesn’tDownload from https://github.com/BishopFox/sliver/releases
NetExec (the maintained CrackMapExec fork)Kali ships netexec; Parrot may have older crackmapexecpipx install netexec
Starkiller (Empire GUI)Kali ships in kali-tools-post-exploitationDownload from https://github.com/BC-SECURITY/Starkiller/releases as AppImage
Caldera (MITRE ATT&CK emulation)Kali shipsgit clone https://github.com/mitre/caldera.git + install
Mythic C2Kali shipsDocker; pull from https://github.com/its-a-feature/Mythic
Faraday community platformKali ships faraday-server; Parrot has olderDocker install via upstream docs
GoPhishKali shipsDownload release from https://github.com/gophish/gophish/releases
PEASS-ng (LinPEAS / WinPEAS)Kali shipswget from GitHub releases

For most of these, the install pattern is: pipx install for Python tools, AppImage download for GUI tools, Docker for server-class tools, git clone for active dev projects.

6. Tools Parrot has that Kali doesn’t {#parrot-only}

The reverse list — Parrot’s distinctive offerings:

ToolWhat it is
AnonSurfSystem-wide Tor routing (Vol 5 § 4). Available as kali-anonsurf third-party package on Kali, but not first-class.
Parrot-shellCustom zsh prompt theme integrated with AnonSurf state.
Parrot Privacy ModeA MATE session that disables logging, sets up tmpfs /tmp, runs everything through firejail. Press the Privacy Mode toggle in the system tray.
Parrot CleanerOne-click cleanup of bash history, system logs, browser caches. The “covering tracks” function bundled.
Cryptcrack toolkit (custom)Parrot’s curated collection of hash-cracking scripts wrapping hashcat.
anti-forensic boot modeA boot option (from GRUB) that mounts no swap, no drives — for triage of evidence devices without alteration.
Better Calamares LUKS+LVM defaultsParrot’s installer creates a more polished LUKS+LVM layout out of the box. Kali requires manual partitioning for the same.
Parrot-style menu organizationSubjective, but Parrot’s MATE pentest menu structure mirrors industry-standard categories better than Kali’s Xfce menu.

7. Installing the missing pieces cleanly {#installing-missing}

The cleanest patterns for adding what Parrot doesn’t bundle.

7.1 Python tools — pipx

pipx installs Python CLI tools in isolated venvs and links them into ~/.local/bin/. No system-Python pollution, no pip install --user conflicts.

sudo apt install pipx
pipx ensurepath
# Restart shell or source ~/.zshrc

# Install tools
pipx install netexec
pipx install impacket
pipx install bloodhound      # the CLI; the GUI is separate
pipx install pwntools
pipx install volatility3
pipx install cme             # CrackMapExec (legacy; prefer netexec)
pipx install certipy-ad
pipx install kerbrute
pipx install enum4linux-ng

7.2 Go tools — go install

Many Go-based pentest tools (subfinder, naabu, httpx, nuclei, ffuf, gobuster recent versions) are best installed via go install:

sudo apt install golang
export PATH=$PATH:~/go/bin   # add to ~/.zshrc

go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install -v github.com/projectdiscovery/naabu/v2/cmd/naabu@latest
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest
go install -v github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest
go install -v github.com/ffuf/ffuf/v2@latest
go install -v github.com/OJ/gobuster/v3@latest

7.3 Rust tools — cargo install

For Rust-based pentest tools (rustscan, feroxbuster, etc.):

sudo apt install cargo rustc
cargo install rustscan
cargo install feroxbuster
cargo install x8           # parameter discovery

Binaries land in ~/.cargo/bin/ — add to PATH.

7.4 AppImages — single-file binaries

For desktop apps that don’t have a Parrot package (Burp Suite Pro, OWASP ZAP, Bitwarden Desktop, Starkiller):

  1. Download the .AppImage file.
  2. chmod +x ~/Downloads/AppName.AppImage.
  3. Drop into ~/Applications/ (create the folder if missing).
  4. Use AppImageLauncher (sudo apt install appimagelauncher) to integrate into the MATE menu — drag the AppImage into AppImageLauncher’s UI, it creates a .desktop file.

7.5 Flatpak — sandboxed cross-distro apps

Flatpak is Parrot-supported but not enabled by default in Security Edition:

sudo apt install flatpak gnome-software-plugin-flatpak
flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo
# Restart session

# Install apps:
flatpak install flathub org.mozilla.firefox
flatpak install flathub com.bitwarden.desktop
flatpak install flathub org.signal.Signal
flatpak install flathub im.riot.Riot       # Element / Matrix client

Flatpak apps run in their own sandbox — convenient, but pentest tools sometimes break in the sandbox (no raw socket access, restricted PATH, no access to outside ~/).

7.6 Docker — for server-class tools

sudo apt install docker.io docker-compose
sudo usermod -aG docker $USER
# Log out + back in for group change

# Examples
docker pull bishopfox/sliver-server:latest
docker pull mitre/caldera:latest
docker pull mythic/mythic-cli:latest

docker run -d --name dvwa -p 80:80 vulnerables/web-dvwa

7.7 Pinning Kali’s repos to Parrot — the “Don’t”

A pattern occasionally suggested online: add Kali’s apt repository to Parrot’s /etc/apt/sources.list.d/ to pull Kali-only packages. Do not do this. Mixed-distro apt configurations break package dependencies the first time something significant updates. Either install the missing tool via pipx/go install/AppImage, or run a Kali VM alongside Parrot.

8. Version drift between Parrot and Kali {#version-drift}

Both distros track upstream tool development, but the cadence differs.

ToolUpdate cadence on ParrotUpdate cadence on Kali
Metasploit FrameworkWeekly (Parrot’s mirror of Rapid7’s repo)Daily (Kali’s mirror is more aggressive)
nmapQuarterly (in line with Debian Testing)Quarterly
sqlmapMonthlyMonthly
WiresharkQuarterlyQuarterly
Burp Suite CommunityWhen upstream releasesWhen upstream releases (slightly faster)
hashcatMonthlyMonthly
Aircrack-ngQuarterlyQuarterly
BloodHoundNot packagedQuarterly (Kali team backports)

For the latest version of any specific tool, apt show <tool> shows the packaged version; the upstream project’s GitHub releases show the absolute current. If you need bleeding-edge, install from upstream (pipx/go/cargo or git clone + build).

9. The fully-loaded daily-driver: a recommended install set {#daily-driver-set}

For Jeff’s daily-driver use case, this is a sensible installed-set the day after install:

9.1 Parrot metapackages

sudo apt install \
    parrot-tools-network \
    parrot-tools-web \
    parrot-tools-wireless \
    parrot-tools-passwords \
    parrot-tools-forensics \
    parrot-tools-reverse \
    parrot-tools-exploit \
    parrot-tools-pwn \
    parrot-tools-sniffer \
    parrot-tools-vuln \
    parrot-tools-anon \
    parrot-tools-info \
    parrot-tools-rfid \
    parrot-tools-iot \
    parrot-tools-mobile \
    parrot-tools-malware

(Skipped parrot-tools-cloud — install when Jeff starts cloud work. Skipped parrot-tools-stress — DoS tools, narrow use case. Skipped parrot-tools-full — pulls all of the above + several extras Jeff may not need.)

9.2 Additional individual packages

sudo apt install \
    wireshark tshark dumpcap \
    gnuradio gqrx-sdr gr-osmosdr rtl-sdr hackrf \
    code            # VS Code from Microsoft, or replace with codium
    git tig         # version control
    tmux            # terminal multiplexer
    zsh fzf ripgrep fd-find bat exa htop btop \
    keepassxc       # password manager
    obsidian        # notes (if available; else AppImage)
    flameshot       # screenshot
    obs-studio      # screen recording for demos / writeups
    kvm qemu virt-manager libvirt-daemon-system bridge-utils \
    docker.io docker-compose \
    pipx golang cargo rustc \
    minicom picocom screen tio   # serial console

9.3 Python tools via pipx

for tool in netexec impacket bloodhound pwntools volatility3 \
            certipy-ad kerbrute enum4linux-ng requests-toolbelt \
            sherlock-project holehe; do
    pipx install $tool
done

9.4 Go tools via go install

for tool in github.com/projectdiscovery/subfinder/v2/cmd/subfinder \
            github.com/projectdiscovery/naabu/v2/cmd/naabu \
            github.com/projectdiscovery/httpx/cmd/httpx \
            github.com/projectdiscovery/nuclei/v3/cmd/nuclei \
            github.com/projectdiscovery/dnsx/cmd/dnsx \
            github.com/ffuf/ffuf/v2 \
            github.com/OJ/gobuster/v3 \
            github.com/tomnomnom/assetfinder \
            github.com/tomnomnom/waybackurls; do
    go install -v ${tool}@latest
done

9.5 AppImages

9.6 Browsers

  • Firefox — pre-installed; harden via arkenfox/user.js if security-conscious
  • Braveapt install brave-browser after adding Brave’s repo (or via Flatpak)
  • Tor Browser — for clear-browser Tor sessions

9.7 Disk space estimate

The above set lands in 30-40 GB under /. Comfortable on the Vol 3 § 5.2 80 GB / partition.

10. Cheatsheet additions {#cheatsheet-feed}

  • Install all Parrot pentest tools: sudo apt install parrot-tools-full.
  • Per-category install: sudo apt install parrot-tools-<category>. Categories: network, web, wireless, passwords, forensics, reverse, exploit, pwn, sniffer, vuln, anon, info, cloud, mobile, rfid, iot, malware.
  • Find what package owns a tool: apt-file search <command> (after sudo apt install apt-file && sudo apt-file update).
  • Find newer version of installed tool: apt show <tool> vs upstream GitHub release.
  • Install Python pentest tool: pipx install <package>.
  • Install Go pentest tool: go install -v <repo path>@latest.
  • Install Rust pentest tool: cargo install <crate>.
  • Add Flatpak (Flathub): flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo.
  • DO NOT mix Kali repos into Parrot’s apt sources.
  • List installed Parrot metapackages: dpkg -l 'parrot-tools-*' | grep '^ii'.