Index of Tools

Footprinting & Recon Tools :

  1. Nmap : Network Mapper Tool

  2. EmailTrackerPro

  3. Foca : Ultimate GUI based recon tools

  4. Maltego Commnity Edition

  5. dnsrecon

  6. GRecon

  7. Holehe

  8. Photon

  9. Sherlock

  10. Spiderfoot

  11. Tracert , Traceroute , Path Analyzer Pro

  12. Web Data Extractor : Spider crawler

  13. HTTrack : Website cloner

Network Scanning & Enumeration Tools :

  1. Wireshark

  2. Rustscan

  3. Sx-Tool

  4. Colasoft Packet Builder

  5. Angry IP Scanner & Advanced IP Scanner

  6. SuperEnum

  7. Global Network Inventory

  8. Active Directory Explorer (LDAP)

  9. NetBIOS Enumerator

  10. SMB Eagle

  11. SMTPWalk

Vulnerability Assessment Tools :

  1. Nessus Vulnerability Scanner

  2. OpenVAS Vulnerability Scanner - Open Source

  3. ZAProxy

System Hacking Tools :

  1. CrackMapExec

  2. Ncat

  3. Poverview

  4. Impacket

  5. Rubeus

  6. WinPEAS

  7. Immunity Debugger : Buffer Overflow tool

  8. Vulnserver

  9. Reverse Shell Generator

  10. Metasploit

  11. Hashcat

  12. Hydra

  13. JohnTheRipper

  14. Spyrix Spyware

  15. OpenStego

  16. Responder

Virus & Threats

  1. Swayz Cryptor

  2. Chaos Ransomware Builder

  3. HTTP Trojan

  4. NjRAT

  5. JPS Virus Maker

  6. Internet Worm Maker thing

  7. Malware Analysis Tools :

    1. Static Malware Analysis Tools

      1. CAPA

      2. Ghidra

      3. OllyDBG

      4. IDA Pro

      5. DIE

      6. PEid

      7. PE Studio

      8. PE extractor

    2. Dynamic Malware Analysis Tools :

      1. API Monitor

      2. DNS Query Sniffer

      3. FileSight Trial : File Monitoring Tool

      4. Mirekusoft Installation Monitor

      5. Currport

      6. TCP View

      7. Process Monitor

      8. Reg Organizor

      9. Autorun for windows

      10. WinPetrol

  8. File Backup & Imaging tools :

    1. Disk Genius

    2. dd : linux image

    3. R-Drive

Social Engineering Tools :

  1. Cain & ABEL

  2. XARP

  3. SMAC & TMAC

  4. Social Engineering toolkit

  5. Shellphish

  6. Darkphish

Denial of Service (DoS & DDoS) :

  1. LOIC : Low orbit ion cannon

  2. HOIC : High orbit ion cannon

  3. ISB : Iam So Board

  4. UltraDDoS

  5. EagleDDos.py

  6. AntiDDoS Guardian

  7. PyDDoS

  8. PyFlooder

  9. Honeypot & IDS :

    1. Snort

    2. Cowrie

    3. KFsensor

    4. HoneyBOT

  10. Firewalls (Open Source) :

    1. Sophos XG

    2. Pfsense

    3. Zone Alarm Free Firewall

Server , Session & Web Application exploitation tools :

  1. CAIDO

  2. Hetty

  3. HTTP Tunneling

    1. HTTP Host

    2. HTTP Port

  4. HTTP Recon

  5. SmartScanner

  6. Vega Vulnerability Scanner (Web Application)

  7. NStalker

  8. JWT Server

  9. SQL Injection Tools :

    1. DSSS

    2. Gauri

    3. SQL Map

Wireless & Mobile Application attacks :

  1. Aircrack-ng Cracking Suite

  2. Sparrow Wifi

  3. Microsoft Network Monitor

  4. RougeHost APD

  5. AndroRAT

  6. PhoneSploit Pro

  7. ADB

Cloud , IOT & OT Hacking tools :

  1. Bitwise IOT Simulator

  2. MicroSIP

  3. ICSim

  4. AADInternals

  5. Bucket-Flaws

  6. Cloudbrute

  7. Cloudfox

  8. Larys3-master

  9. S3Scanner

  10. Trivy

Cryptography Tools :

  1. Veracrypt

  2. Alphapeeler

  3. Cryptool

  4. Advanced Encryption Package

  5. BC Text Encoder

  6. Cryptoforage

  7. Rohos Disk Encryption

  8. HashCalc

  9. HashMyFiles

  10. MD5 Calculator

Last updated