top of page

Go-to Tools for Pentesting

Operating Systems

  • Kali – GNU/Linux distribution designed for digital forensics and penetration testing Hacking Tools

  • ArchStrike – Arch GNU/Linux repository for security professionals and enthusiasts.

  • BlackArch – Arch GNU/Linux-based distribution with best Hacking Tools for penetration testers and security researchers.

  • Network Security Toolkit (NST) – Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.

  • Pentoo – Security-focused live CD based on Gentoo.

  • BackBox – Ubuntu-based distribution for penetration tests and security assessments.

  • Parrot – Distribution similar to Kali, with multiple architectures with 100 of Hacking Tools.

  • Fedora Security Lab – Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.

  • The Pentesters Framework – Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.

  • AttifyOS – GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.

Vulnerability Scanners

  • Nexpose – Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.

  • Nessus – Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.

  • OpenVAS – Free software implementation of the popular Nessus vulnerability assessment system.

  • Vuls – Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.

Web Scanners

  • Nikto – Noisy but fast black box web server and web application vulnerability scanner.

  • Arachni – Scriptable framework for evaluating the security of web applications.

  • w3af – Hacking Tools for Web application attack and audit framework.

  • Wapiti – Black box web application vulnerability scanner with built-in fuzzer.

  • SecApps – In-browser web application security testing suite.

  • WebReaver – Commercial, graphical web application vulnerability scanner designed for macOS.

  • WPScan – Hacking Tools of Black box WordPress vulnerability scanner.

  • cms-explorer – Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.

  • joomscan – on of the best Hacking Tools for Joomla vulnerability scanner.

  • ACSTIS – Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.

Network Tools

  • zmap – Open source network scanner that enables researchers to easily perform Internet-wide network studies.

  • nmap – Free security scanner for network exploration & security audits.

  • pig – one of the Hacking Tools forGNU/Linux packet crafting .

  • scanless – Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.

  • tcpdump/libpcap – Common packet analyzer that runs under the command line.

  • Wireshark – Widely-used graphical, cross-platform network protocol analyzer.

  • – Website offering an interface to numerous basic network utilities like ping, traceroute, whois, and more.

  • netsniff-ng – Swiss army knife for for network sniffing.

  • Intercepter-NG – Multifunctional network toolkit.

  • SPARTA – Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.

  • dnschef – Highly configurable DNS proxy for pentesters.

  • DNSDumpster – one of the Hacking Tools for Online DNS recon and search service.

  • CloudFail – Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.

  • dnsenum – Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.

  • dnsmap – One of the Hacking Tools for Passive DNS network mapper.

  • dnsrecon – One of the Hacking Tools for DNS enumeration script.

  • dnstracer – Determines where a given DNS server gets its information from, and follows the chain of DNS servers.

  • passivedns-client – Library and query tool for querying several passive DNS providers.

  • passivedns – Network sniffer that logs all DNS server replies for use in a passive DNS setup.

  • Mass Scan – best Hacking Tools for TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

  • Zarp – Network attack tool centered around the exploitation of local networks.

  • mitmproxy – Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

  • Morpheus – Automated ettercap TCP/IP Hacking Tools .

  • mallory – HTTP/HTTPS proxy over SSH.

  • SSH MITM – Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.

  • Netzob – Reverse engineering, traffic generation and fuzzing of communication protocols.

  • DET – Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.

  • pwnat – Punches holes in firewalls and NATs.

  • dsniff – Collection of tools for network auditing and pentesting.

  • tgcd – Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.

  • smbmap – Handy SMB enumeration tool.

  • scapy – Python-based interactive packet manipulation program & library.Dshell – Network forensic analysis framework.

  • Debookee – Simple and powerful network traffic analyzer for macOS.

  • Dripcap – Caffeinated packet analyzer.

  • Printer Exploitation Toolkit (PRET) – Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.

  • Praeda – Automated multi-function printer data harvester for gathering usable data during security assessments.

  • routersploit – Open source exploitation framework similar to Metasploit but dedicated to embedded devices.

  • evilgrade – Modular framework to take advantage of poor upgrade implementations by injecting fake updates.

  • XRay – Network (sub)domain discovery and reconnaissance automation tool.

  • Ettercap – Comprehensive, mature suite for machine-in-the-middle attacks.

  • BetterCAP – Modular, portable and easily extensible MITM framework.

  • CrackMapExec – A swiss army knife for pentesting networks.

  • impacket – A collection of Python classes for working with network protocols.

Wireless Network Hacking Tools

  • Aircrack-ng – Set of Penetration testing & Hacking Tools list for auditing wireless networks.

  • Kismet – Wireless network detector, sniffer, and IDS.

  • Reaver – Brute force attack against WiFi Protected Setup.

  • Wifite – Automated wireless attack tool.

  • Fluxion – Suite of automated social engineering based WPA attacks.

Web Exploitation

  • OWASP Zed Attack Proxy (ZAP) – Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.

  • Fiddler – Free cross-platform web debugging proxy with user-friendly companion tools.

  • Burp Suite – One of the Hacking Tools ntegrated platform for performing security testing of web applications.

  • autochrome – Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.

  • Browser Exploitation Framework (BeEF) – Command and control server for delivering exploits to commandeered Web browsers.

  • Offensive Web Testing Framework (OWTF) – Python-based framework for pentesting Web applications based on the OWASP Testing Guide.

  • WordPress Exploit Framework – Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.

  • WPSploit – Exploit WordPress-powered websites with Metasploit.

  • SQLmap – Automatic SQL injection and database takeover tool.

  • tplmap – Automatic server-side template injection and Web server takeover Hacking Tools .

  • weevely3 – Weaponized web shell.

  • Wappalyzer – Wappalyzer uncovers the technologies used on websites.

  • WhatWeb – Website fingerprinter.

  • BlindElephant – Web application fingerprinter.

  • wafw00f – Identifies and fingerprints Web Application Firewall (WAF) products.

  • fimap – Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.

  • Kadabra – Automatic LFI exploiter and scanner.

  • Kadimus – LFI scan and exploit tool.

  • liffy – LFI exploitation tool.

  • Commix – Automated all-in-one operating system command injection and exploitation tool.

  • DVCS Ripper – Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.

  • GitTools – One of the Hacking Tools that Automatically find and download Web-accessible .git repositories.

  • sslstrip – One of the Hacking Tools Demonstration of the HTTPS stripping attacks.

  • sslstrip2 – SSLStrip version to defeat HSTS.

  • NoSQLmap – Automatic NoSQL injection and database takeover tool.

  • VHostScan – A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.

  • FuzzDB – Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

  • EyeWitness – Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.

  • webscreenshot – A simple script to take screenshots of list of websites.

Hex Editors

  • HexEdit.js – Browser-based hex editing.

  • Hexinator – World’s finest (proprietary, commercial) Hex Editor.Frhed – Binary file editor for Windows.

  • 0xED – Native macOS hex editor that supports plug-ins to display custom data types.

File Format Analysis Tools

  • Kaitai Struct – File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.

  • Veles – Binary data visualization and analysis tool.

  • Hachoir – Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.

Defense Evasion Tools

  • Veil – Generate metasploit payloads that bypass common anti-virus solutions.

  • shellsploit – Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.

  • Hyperion – Runtime encryptor for 32-bit portable executables (“PE .exes”).

  • AntiVirus Evasion Tool (AVET) – Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.

  • – Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.

  • peCloakCapstone – Multi-platform fork of the automated malware antivirus evasion tool.

  • UniByAv – Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.

Hash Cracking Hacking Tools

  • John the Ripper – One of the best Hacking Tools for Fast password cracker.

  • Hashcat – Another One of the Hacking Tools The more fast hash cracker.

  • CeWL – Generates custom wordlists by spidering a target’s website and collecting unique words.

  • JWT Cracker – Simple HS256 JWT token brute force cracker.

  • Rar Crack – RAR bruteforce cracker.

  • BruteForce Wallet – Find the password of an encrypted wallet file (i.e. wallet.dat).

DDoS Tools

  • LOIC – Open source network stress tool for Windows.

  • JS LOIC – JavaScript in-browser version of LOIC.

  • SlowLoris – DoS tool that uses low bandwidth on the attacking side.

  • HOIC – Updated version of Low Orbit Ion Cannon, has ‘boosters’ to get around common counter measures.

  • T50 – Faster network stress tool.

  • UFONet – Abuses OSI layer 7 HTTP to create/manage ‘zombies’ and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

Social Engineering Tools

  • Social Engineer Toolkit (SET) – Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.

  • King Phisher – One of the Hacking Tools for Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.

  • Evilginx – MITM attack framework used for phishing credentials and session cookies from any Web service.

  • wifiphisher – Automated phishing attacks against WiFi networks.

  • Catphish – Tool for phishing and corporate espionage written in Ruby.

  • Beelogger – Tool for generating keylooger.

Anonymity Tools

  • Tor – Free software and onion routed overlay network that helps you defend against traffic analysis.

  • OnionScan – One of the Hacking Tools for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.

  • I2P – The Invisible Internet Project.

  • Nipe – Script to redirect all traffic from the machine to the Tor network.

  • What Every Browser Knows About You – Comprehensive detection page to test your own Web browser’s configuration for privacy and identity leaks.

Physical Access Tools

  • LAN Turtle – Covert “USB Ethernet Adapter” that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.

  • USB Rubber Ducky – Customizable keystroke injection attack platform masquerading as a USB thumbdrive.

  • Poisontap – Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.

  • WiFi Pineapple – Wireless auditing and penetration testing platform.

  • Proxmark3 – RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.

Side-channel Tools

  • ChipWhisperer – Complete open-source toolchain for side-channel power analysis and glitching attacks.

CTF Tools

  • ctf-tools – Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.

  • Pwntools – Rapid exploit development framework built for use in CTFs.

  • RsaCtfTool – Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.

Hope this is informational

Thank You

132 views0 comments

Recent Posts

See All
bottom of page