Of course, hackers use Kali. Kali Linux will come pre-installed with several equipment which make it a lot easier for them to test the safety of methods and networks. Kalifile could be the file you downloaded. The first file's checksum will be the hash with the Kali down load website https://penaiac963lop2.activosblog.com/30653789/kali-an-overview