Search

Table of Contents:

  1. Penetration Testing Tools
    • Metasploit
    • Nmap
    • Wireshark
    • Burp Suite
    • OWASP ZAP
    • John the Ripper
    • Hydra
    • SQLMap
    • Nikto
    • Acunetix
  2. Vulnerability Scanners
    • Nessus
    • OpenVAS
    • Qualys
    • Nexpose
    • Retina
    • Rapid7 InsightVM
    • Netsparker
  3. Network Analysis Tools
  4. Wireless Hacking Tools
    • Aircrack-ng
    • Kismet
    • Reaver
    • Fern Wi-Fi Cracker
    • Fluxion
    • WiFite
  5. Password Cracking Tools
    • John the Ripper
    • Hashcat
    • Hydra
    • Medusa
    • Cain and Abel
  6. Web Application Scanners
    • Acunetix
    • OWASP ZAP
    • Burp Suite
    • Nikto
    • Wapiti
    • Skipfish
  7. Exploitation Tools
    • Metasploit
    • ExploitDB
    • BeEF
    • SET (Social Engineering Toolkit)
    • Armitage
  8. Forensics Tools
    • Autopsy
    • Sleuth Kit
    • Volatility
    • Wireshark
    • FTK (Forensic Toolkit)
  9. DDoS (Distributed Denial of Service) Tools
  10. Steganography Tools
    • OpenStego
    • Steghide
    • SilentEye
    • Outguess
    • DeepSound
  11. Social Engineering Tools
    • SET (Social Engineering Toolkit)
    • BeEF
    • Maltego
    • Social-Engineer Toolkit
    • Evilginx
  12. Firewall Evasion Tools
    • Psiphon
    • SSH Tunneling
    • ProxyChains
    • Hping
    • Firewall bypass scripts
  13. Encryption Tools
    • TrueCrypt/VeraCrypt
    • GnuPG
    • OpenSSL
    • Cryptcat
    • Tor
  14. Packet Crafting Tools
    • Scapy
    • Hping
    • PackETH
    • Nemesis
    • Yersinia
  15. Password Managers
    • LastPass
    • Dashlane
    • 1Password
    • Bitwarden
    • Keeper
  16. Antivirus and Anti-Malware Tools
  17. Intrusion Detection and Prevention Systems (IDS/IPS)
    • Snort
    • Suricata
    • Bro
    • OSSEC
    • Security Onion

Address & Contact

Our Address

-

Telephone

-

Email

-

Web

-