# Syntax
#[<]COMMAND[>] [PARAMETERS] [ : PACKAGE ] [ -> FILE_NAME]
#  [ ... ] <-------------------------------------------- Any extra data that you want to append to the desktop file
#                                               ^------- Set the output .desktop file name (optional)
#                                  ^-------------------- Set package that provides the tool (optional)
#                   ^----------------------------------- Command parameters (optional)
#                                                             Add [GUI] parameter to disable tool running from terminal
#       ^----------------------------------------------- Command. If wrapped by `<` `>` it uses a helper-script instead

0trace.sh
above -h
affcat
afl-fuzz -h
aircrack-ng --help
sudo airgeddon
amass -h
apache-users
apktool
<armitage> [GUI]
  StartupWMClass=armitage-ArmitageMain
arping --help : arping
arping : iputils-arping -> kali-iputils-arping
sudo arpspoof
arpwatch -h
asleap -h
ass
assetfinder -h
atk6-thcping6 -h
sudo autopsy
autorecon --help
azurehound
backdoor-factory -h
bed
sudo beef-xss
sudo beef-xss-stop
bettercap -h
binwalk -h
binwalk3 -h
blkcalc
blkcat
blkls
blkstat
bloodhound
bloodhound-python -h
bloodhound-ce-python -h
bluelog -h
blueranger
bluesnarfer
bopscrk -h
braa -h
btscanner --help
bulk_extractor -h
bully -h
burpsuite [GUI]
  StartupWMClass=burp-StartBurp
bytecode-viewer [GUI]
  StartupWMClass=the-bytecode-club-bytecodeviewer-BytecodeViewer
cadaver
caido [GUI] -> caido
caido-cli -h
CAT --help
ccrypt -h
cdp
cewl -h
cge.pl
cherrytree %f [GUI] -> cherrytree
  Icon=cherrytree
  MimeType=application/cherrytree-ctd;application/cherrytree-ctz;application/cherrytree-ctb;application/cherrytree-ctx;
chirpw %F [GUI] -> chirp
  Icon=chirp
  MimeType=x-scheme-handler/chirp
chisel --help
chisel-common-binaries
chkrootkit -h
chntpw -h
cisco-ocs
cisco-torch --help
clamscan -h
clang --help : clang
clang++ --help : clang
cmospwd -h
commix --wizard
copy-router-config.pl
cowpatty -h
crackle
crackmapexec -h
creddump7
crowbar --help
crunch
cryptsetup --help
crlfuzz -h
cstool -h
cutter [GUI] -> re.rizin.cutter
  Icon=cutter
cutycapt --help
cymothoa -h
d2j-dex2jar -h
darkstat --help
davtest
dbd -h
dc3dd --help
dcfldd --help
dd_rescue -h
sudo defectdojo
sudo defectdojo-stop
detect-it-easy [GUI] -> die
  Exec=die %F
  MimeType=application/octet-stream;
  StartupWMClass=die
dhcpig -h
dirb
dirbuster [GUI]
  StartupWMClass=com-sittinglittleduck-DirBuster-Start
dirsearch -h
dmitry
dns-rebind
dns2tcpc
dns2tcpd
dnschef -h
dnscat -h
dnsenum -h
dnsmap
dnsrecon -h
dnstracer
dnswalk --help
donut
sudo dradis
sudo dradis-stop
driftnet -h -> driftnet
  Icon=driftnet
dsniff -h
dvwa-start
dvwa-stop
eapmd5pass -h
edb [GUI] -> edb
  Icon=edb48-logo
email2phonenumber -h
enum4linux -h
enum4linux-ng -h
enumiax -h
ettercap -h : ettercap-text-only -> ettercap-text-only
ettercap-pkexec -G [GUI] : ettercap-graphical -> ettercap
  Icon=ettercap
evil-winrm -h
evilginx2
evilgrade
ewfacquire -h
exe2hex -h
exploitdb-papers
ext3grep --help
ext4magic
extundelete --help
eyewitness -h
fang -h
sudo faraday
<faraday-stop> : faraday
fcrackzip -h
pkexec fern-wifi-cracker [GUI]
feroxbuster -h
ferret-sidejack -h
ffind
ffuf -h
fierce -h
fiked -h
finalrecon -h
firewalk -h
fls
foremost -h
fping -h
fragrouter
freeradius -h
fsstat
ftest
fwbuilder %F [GUI] -> fwbuilder
  MimeType=text/x-xml-fwbuilder;
  StartupWMClass=fwbuilder
galleta
generic_chunked
generic_listen_tcp
generic_send_tcp
generic_send_udp
ghidra [GUI]
  StartupWMClass=ghidra-Ghidra
gitxray
gnuradio-companion %F [GUI] -> gnuradio-grc
  Icon=gnuradio-grc
  MimeType=application/gnuradio-grc;
  StartupWMClass=gnuradio-companion
gobuster help
goldeneye -h
gophish
gophish-stop
goshs -h
gospider -h
gqrx [GUI] -> dk.gqrx.gqrx
  Icon=gqrx
  StartupWMClass=gqrx
grokevt-addlog
grokevt-builddb
grokevt-findlogs
grokevt-parselog
grokevt-ripdll
pkexec guymager [GUI] -> guymager
  Icon=guymager_128
sudo gvm-check-setup
sudo gvm-feed-update
sudo gvm-setup
sudo gvm-start
sudo gvm-stop
hackrf_info
hamster-sidejack
hash-identifier
hashcat -h
hashdeep -h
hashid -h
hashrat --help
<havoc>
sudo hb-honeypot
heartleech
hexinject -h
hfind
hoaxshell -h
hping3 -h
httrack
<hydra>
iaxflood
icat
ifind
ike-scan -h
ils
img_cat
img_stat
<impacket-scripts>
impacket-mssqlclient -h
impacket-psexec -h
impacket-smbexec -h
impacket-smbserver -h
instaloader --help
intrace
inviteflood -h
iodine-client-start
istat
jadx-gui [GUI]
  StartupWMClass=jadx-gui-JadxGUI
javasnoop [GUI]
  StartupWMClass=com-aspect-snoop-JavaSnoop
jboss-linux -h
jboss-win -h
jcat
jd-gui [GUI]
  StartupWMClass=org-jd-gui-App
jls
<john>
johnny [GUI]
  StartupWMClass=johnny
joomscan -h
jsql [GUI]
  StartupWMClass=com-jsql-MainApplication
juice-shop
juice-shop-stop
kismet -h
koadic
kerberoast
krbrelayx -h
laudanum
lbd
ldeep -h
pkexec legion [GUI]
  StartupWMClass=legion.py
ligolo-agent -h
ligolo-proxy -h
ligolo-mp -h
ligolo-mp-client -h
ligolo-ng-common-binaries
linkedin2username -h
linpeas
sudo lynis audit system -> lynis
mac-robber
macchanger -h
mactime
magicrescue
maltego [GUI]
  StartupWMClass=Maltego
/usr/share/kali-menu/install-packages maltego : maltego -> kali-maltego-installer
  Name=maltego (installer)
  Icon=kali-maltego
maryam
maskgen -h
masscan --help
massdns -h
mdb-sql -h
sudo mdk3 --help
medusa
merge-router-config.pl
metagoofil -h
<metasploit-framework>
mfcuk
mfoc -h
mfterm -h
mifare-classic-format -h
mimikatz
minicom -h -> minicom
miredo -h
missidentify -h
mitm6 -h
mitmproxy -h
mmcat
mmls
mmstat
msf-nasm_shell
msfpc
msfvenom -h
myrescue -h
mysql -h
nbtscan
ncat -h
ncrack -h
netcat -h
netdiscover -h
netexec -h
netmask -h
netsniff-ng -h
nfc-list -h
nfc-mfclassic
nikto --Help
nipper --help
nishang
nmap -h
nuclei -h
ollydbg
onesixtyone
sudo ohrwurm
ophcrack [GUI] -> ophcrack
  Icon=ophcrack
ophcrack-cli -h
oscanner
osrframework-cli -h
outguess -h
owasp-mantra-ff
p0f -h
padbuster
paros [GUI]
  StartupWMClass=org-parosproxy-paros-Paros
parsero -h
pasco
<passing-the-hash>
patator
pdf-parser -h
pdfid -h
peass
photon -h
photorec -h
phpggc -h
pipal -h
pixiewps --help
policygen --help
pompem -h
powercat -h
sudo powershell-empire -h
powersploit
protos-sip -help
proxychains4
proxytunnel -h
pspy -h
pspy-binaries
ptunnel -h
pwnat -h
radare2 -h
raven -h
rcrack
rcracki_mt
<readpe>
readpst -h
reaver -h
recon-ng
recordmydesktop -h
recoverdm
recoverjpeg -h
recstudio [GUI]
recstudio-cli
reglookup
regripper -h
responder -h
rfcat -h
rifiuti
rifiuti2 -h
rizin -h
rkhunter -h
rsmangler -h
rtpbreak -h
rtpflood
rtpinsertsound -h
rtpmixsound -h
rubeus
safecopy -h
samdump2 -h
sara -h
sbd -h
scalpel -h
scapy
scrounge-ntfs -h
sctpscan
searchsploit -h
seclists
sentrypeer -h
sudo setoolkit
sfuzz -h
sharphound
shellnoob -i
shellter
sherlock -h
sickle-tool -h
sidguess
siege -h
sigfind
siparmyknife
sipcrack
sipp
sippts -h
sipsak -h
skipfish -h
slowhttptest -h
smbclient
smbmap -h
smtp-user-enum -h
sudo sniffjoke --help
pkexec snapper-gui [GUI] -> snapper-gui
  Icon=drive-harddisk
  Categories=Utility;Settings;X-XFCE-SettingsDialog
snmp-check -h
snort --help
socat -h
sorter
pkexec sparrow-wifi [GUI]
spiderfoot -h
spiderfoot-cli
spooftooph -h
sqldict
sqlitebrowser %f [GUI] -> sqlitebrowser
  Icon=sqlitebrowser
  MimeType=application/vnd.db4s-project+xml;application/sqlitebrowser;application/x-sqlitebrowser;application/vnd.sqlite3;application/geopackage+sqlite3;application/x-sqlite2;application/x-sqlite3;
sqlmap --wizard
sqlninja
sqlsus -h
srch_strings -h
ssdeep -h
sshuttle -h
ssldump -h
sslh -h
sslscan --help
sslsniff
sslsplit -h
sslyze -h
starkiller
statsgen -h
steghide -h
stegosuite gui %u [GUI] -> org.stegosuite
  Comment=A steganography tool
  Icon=stegosuite
  MimeType=image/gif;image/bmp;image/jpeg;image/png;
stegsnow -h
stunnel4 -help
subfinder -h
subjack
sublist3r -h
sucrack -h
svcrack -h
svcrash -h
svmap -h
svreport -h
svwar -h
swaks --help
t50 --help
tcpdump -h
tcpflow -h
tcpreplay -h
termineter
testdisk -h
thc-pptp-bruter
thc-ssl-dos -h
theHarvester -h
tiger -h -> tiger
tinja
tlssled
tnscmd10g
truecrack -h
trufflehog
tsk_comparedir
tsk_gettimes
tsk_loaddb
tsk_recover
twofi -h
ubertooth-util
udptunnel -h
undbx -h
sudo unhide -h
uniscan-gui [GUI]
unix-privesc-check
urlcrazy -h
unicornscan -h
veil
villain
vinetto -h
voiphopper -h
wafw00f -h
wapiti -h
wash -h
watobo [GUI]
wcvs -h
webacoo -h
webscarab [GUI]
  StartupWMClass=org-owasp-webscarab-Main
webshells
weevely terminal -h
wfuzz -h
whatweb -h
wifi-honey -h
wifiphisher -h
wifipumpkin3 -h
wifite -h
winpeas
<wireshark> %f [GUI] -> org.wireshark.Wireshark
  Icon=org.wireshark.Wireshark
  MimeType=application/vnd.tcpdump.pcap;application/x-pcapng;application/x-snoop;application/x-iptrace;application/x-lanalyzer;application/x-nettl;application/x-radcom;application/x-etherpeek;application/x-visualnetworks;application/x-netinstobserver;application/x-5view;application/x-tektronix-rf5;application/x-micropross-mplog;application/x-apple-packetlogger;application/x-endace-erf;application/ipfix;application/x-ixia-vwr;
  StartupWMClass=wireshark
witnessme -h
wixl -h
wordlists
wpscan -h
xfreerdp3 -> xfreerdp3
  StartupWMClass=com.freerdp.FreeRDP
sudo xplico-webui
sudo xplico-webui-stop
xspy
xsser --gtk [GUI] -> xsser
yara --help
sudo yersinia -I
zaproxy [GUI]
  StartupWMClass=org-zaproxy-zap-ZAP
pkexec zenmap %F [GUI] -> zenmap
  Name=zenmap
  Keywords=network;scan;scanner;IP;security;




# Kali specific ----------------------------------------------------------------
x-www-browser https://www.kali.org/ [GUI] : kali-menu -> kali-www
  Name=Kali Linux
  Comment=The official web site of Kali Linux
  Icon=kali-www
x-www-browser https://www.kali.org/docs/ [GUI] : kali-menu -> kali-docs
  Name=Kali Docs
  Comment=Official Kali Linux documentation website
  Icon=kali-docs
x-www-browser https://www.kali.org/tools/ [GUI] : kali-menu -> kali-tools
  Name=Kali Tools
  Comment=Discover tools available in Kali Linux
  Icon=kali-tools
x-www-browser https://www.kali.org/kali-nethunter/ [GUI] : kali-menu -> kali-nethunter
  Name=NetHunter
  Comment=Penetration testing tools on mobile devices
  Icon=kali-nethunter
x-www-browser https://bugs.kali.org/ [GUI] : kali-menu -> kali-bugs
  Name=Kali Bugs
  Comment=The Kali Linux bug tracker
  Icon=kali-bugs
x-www-browser https://forums.kali.org/ [GUI] : kali-menu -> kali-forums
  Name=Kali Forums
  Comment=Get community support on forums
  Icon=kali-forums
x-www-browser https://www.offsec.com/courses-and-certifications/?utm_source=kali&utm_medium=os&utm_campaign=desktop [GUI] : kali-menu -> offsec-training
  Name=OffSec Training
  Comment=Follow courses and get certified to show off your skills
  Icon=offsec
x-www-browser https://www.vulnhub.com/ [GUI] : kali-menu -> vulnhub
  Name=VulnHub
  Comment=Vulnerable by design - lab to download virtual machines to test your skills
  Icon=vulnhub
x-www-browser https://www.exploit-db.com/ [GUI] : kali-menu -> exploit-database
  Name=Exploit Database
  Comment=Archive of public exploits that is CVE compliant
  Icon=exploit-db
x-terminal-emulator -e kali-tweaks -title "Kali Tweaks" [GUI] : kali-tweaks -> kali-tweaks
  Name=Kali Tweaks
  Comment=Tool to adjust advanced configuration settings for Kali Linux
  Icon=kali-tweaks
  Categories=Settings;X-XFCE-SettingsDialog
pwsh
  Name=PowerShell
  Categories=System;Utility
pkexec x-terminal-emulator [GUI] : kali-menu -> root-terminal
  Name=Root Terminal Emulator
  Name[qcv]=Terminal de root
  Name[ar]=طرفيّة الجذر
  Name[ca]=Terminal root
  Name[cs]=Terminál uživatele root
  Name[da]=Root-terminal
  Name[es]=Terminal de «Root»
  Name[fr]=Terminal administrateur
  Name[hu]=Rendszergazda terminál
  Name[it]=Terminale root
  Name[ja]=ルート端末
  Name[ko]=루트 터미널
  Name[lt]=Administratoriaus terminalas
  Name[nl]=Terminal als root
  Name[pl]=Terminal użytkownika root
  Name[pt_BR]=Terminal como Root
  Name[sv]=Root-terminal
  Comment=Opens a terminal as the root user, using sudo to ask for the password
  Comment[qcv]=Obri un terminal com a l'usuari root, utilitzant sudo per a demanar la contrasenya
  Comment[ar]=يفتح طرفيّة كمستخدم جذر، مستخدماً sudo للسؤال عن كلمة السر
  Comment[ca]=Obre un terminal com a l'usuari root, utilitzat sudo per a demanar la contrasenya
  Comment[cs]=Otevře terminál pod uživatelem root, na heslo se dotáže přes sudo
  Comment[da]=Åbner en terminal som brugeren root, og bruger sudo til at spørge om adgangskoden.
  Comment[de]=Öffnet ein Terminal als Benutzer 'root' unter Verwendung von sudo zur Passwortabfrage
  Comment[es]=Abre un terminal como el usuario «root» utilizando sudo para preguntar la contraseña.
  Comment[fr]=Ouvrir un terminal en tant qu'administrateur, en utilisant sudo pour demander le mot de passe
  Comment[hu]=Megnyit egy rendszergazda terminált, a sudo-t használva a jelszó bekérésére
  Comment[it]=Apre un terminale come root, usando sudo per la richiesta della password
  Comment[ja]=パスワードを求めるために、sudo を使い、root ユーザーとして端末を開きます
  Comment[ko]=루트 사용자로 터미널을 열고, sudo로 열쇠글을 물어봅니다
  Comment[lt]=Atveria terminalą 'root' naudotojo teisėmis, naudojant sudo slaptažodžiui įvesti
  Comment[nl]=Start een terminal als de root-gebruiker waarbij sudo gebruikt wordt om het wachtwoord te vragen.
  Comment[pl]=Uruchamia terminal użytkownika root, używając sudo do wczytania hasła
  Comment[pt_BR]=Abre um terminal como usuário root, usando o sudo para pedir a senha
  Comment[sv]=Öppnar en terminal som root-användaren och använder sudo för att fråga efter lösenordet
  Icon=utilities-root-terminal
  Categories=System;Utility;TerminalEmulator




# Desktop Files we want to hide ------------------------------------------------
display-im7.q16 : kali-menu -> display-im7.q16
  Hidden=true
  Categories=hidden
zenmap-root : kali-menu -> zenmap-root
  Hidden=true
  Categories=hidden
TeXdoctk : kali-menu -> texdoctk
  Hidden=true
  Categories=hidden
