List of Hacker Tools for Ethical Hackers



If you are using any Penetration Testing distribution like Kali Linux, BackBox, Lion Sec… you have many many pentest tool. I guess that you can not miss or use all them. I use Linux Minit for Penetration Testing, so i usually install some power pentest tool. Here is my favorite security tool:
[Assembly]
Hex-Rays IDA – http://www.hex-rays.com/products/ida/index.shtml
FWrapper for IDA – http://hooked-on-mnemonics.blogspot.com/2012/12/fwrapper-script-for-accesing-data-in-ida.html

[Password Crackers]
John The Ripper – http://www.openwall.com/john/
THC Hydra – http://www.thc[.]org/thc-hydra/
Aircrack – http://www.aircrack-ng.org/
Airsnort – http://airsnort.shmoo.com/
RainbowCrack – http://project-rainbowcrack.com/
Cowpatty – http://wirelessdefence.org/Contents/coWPAttyMain.html


[Packet Sniffers]
Wireshark – http://www.wireshark.org/
Kismet – http://www.kismetwireless.net/
kismac – http://kismac-ng.org/
Tcpdump – http://www.tcpdump.org/
Ettercap – http://ettercap.sourceforge.net/
Dsniff – http://www.monkey.org/~dugsong/dsniff/
Ngrep – http://ngrep.sourceforge.net/
EtherApe – http://etherape.sourceforge.net/
Nmap – http://nmap.org/
SSLstrip – http://www.thoughtcrime.org/software/sslstrip/
[Vulnerability Scanners]
Nessus – http://www.nessus.org/products/nessus
Sara – http://www-arc.com/sara/
QualysGuard – http://www.qualys.com/
SAINT – http://www.saintcorporation.com/index.html
[Web Vulnerability Scanners]
Nikito – http://www.cirt.net/nikto2
Paros Proxy – http://www.parosproxy.org/
Webscarab – https://www.owasp.org/index.php/Category:OWASP_WebScarab_Project
Whisker/libwhisker – http://sourceforge.net/projects/whisker/
Burpsuite – http://portswigger.net/burp/
W3af – http://w3af.sourceforge.net/

Comments

Related Posts

The Hacker Playbook: Practical Guide To Penetration Testing With Kali Linux PDF

Here are the top 8 Websites To Learn Ethical Hacking – 2017

Certified Ethical Hacker V9 PDFs For Free

How to Hack and Remotely spy on Android phones using Androrat

How to become a professional hacker (Step by Step Guide)