
I have been using Kali Linux as a primary platform for testing the security of Android applications, and overall, it has proven to be a highly capable and flexible environment for this purpose. I appreciate the real-world testing power—it allows me to simulate scenarios and see how systems behave under pressure, making it far more engaging and useful than purely theoretical learning. There's also the flexibility of Kali Linux, as it can be heavily customized whether I'm working on Android apps, networks, or web systems. I can shape the environment to match exactly what I'm trying to test. The initial setup was very easy; I just downloaded and installed it in Hyper-V or another VM environment, or used it through live boot. Review collected by and hosted on G2.com.
1. Steep learning curve: If you’re not already comfortable with Linux and security concepts, Kali can feel overwhelming. Many tools don’t have friendly interfaces, and errors aren’t always easy to understand. 2. Not beginner-friendly UX: Compared to mainstream operating systems, the user experience can feel rough. Things like driver issues, package conflicts, or broken dependencies can slow you down. 3. Tool overload: Kali comes with hundreds of tools, but many overlap in functionality, some are outdated or rarely maintained, and it’s not always clear which tool is best for a specific task. This can create confusion instead of efficiency. 4. Stability issues in some setups: Depending on whether you’re using it in a VM, dual boot, or on bare metal, performance can lag, updates occasionally break tools, and hardware compatibility (like Wi-Fi adapters) can be inconsistent. 5. Not tailored specifically for Android testing: While Kali supports Android security work, it’s not specialized for it. You often need to install extra tools manually, configure environments yourself, and combine multiple tools to get a full workflow. A more focused mobile security toolkit could improve this. 6. Requires strong ethical discipline: Kali gives you powerful capabilities, but it doesn’t enforce boundaries. Misuse can lead to legal trouble. So one 'limitation' is that it relies heavily on the user’s responsibility. Review collected by and hosted on G2.com.





