Kali Linux

Cybersecurity professionals and researchers can now launch Kali Linux in a virtualized container on macOS Sequoia using Apple's new containerization framework.

During WWDC 2025, Apple announced a new containerization framework that allows Apple Silicon hardware to run isolated Linux distros in its virtualized environment, similar to Microsoft Windows Subsystem for Linux 2 (WSL2).

To get started, users on macOS Sequoia with Apple Silicon can install the container CLI via Homebrew and initialize Apple's container framework:

brew install --cask container
container system start

You can then launch Kali Linux using the following command, which loads the container from the DockerHub container library and executes inside a macOS VM.

container run --rm -it kalilinux/kali-rolling

You can also use a container to mount a local directory into the Kali VM with a command like:

container run --remove --interactive --tty --volume $(pwd):/mnt --workdir /mnt docker.io/kalilinux/kali-rolling:latest

This command allows you to access files on the host device from within the container.

However, there are some limitations to the new feature, as it's only available on Apple Silicon and does not support Intel Macs.

Also, the Kali team reports that there are some bugs with the new implementation around networking.

"Currently there are a few known limitations of Containerization, especially using macOS "Sequoia" 15, such as container's network access not getting an IP address or no network access," reads Kali's announcement.

"We recommend reading and following Apple's advice if you run into these issues."

Cybersecurity professional Taha Ex also warns that some Kali use cases that require hardware passthrough will not work due to the container being isolated from hardware.

The ability to quickly launch Kali Linux in macOS, even if in a virtualized environment, and with some limitations, makes it easier for Mac users to perform security testing.

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Related Articles:

Trivy supply-chain attack spreads to Docker, GitHub repos

CISA orders feds to patch DarkSword iOS flaws exploited attacks

New DarkSword iOS exploit used in infostealer attack on iPhones

Apple pushes first Background Security Improvements update to fix WebKit flaw

Apple patches older iPhones and iPads against Coruna exploits