# Index of Tools

#### Footprinting & Recon Tools  :&#x20;

1. Nmap : Network Mapper Tool
2. EmailTrackerPro
3. Foca : Ultimate GUI based recon tools
4. Maltego Commnity Edition
5. dnsrecon&#x20;
6. GRecon&#x20;
7. Holehe&#x20;
8. Photon&#x20;
9. Sherlock&#x20;
10. Spiderfoot
11. Tracert , Traceroute , Path Analyzer Pro
12. Web Data Extractor  : Spider crawler
13. HTTrack : Website cloner

#### Network Scanning & Enumeration Tools :&#x20;

1. Wireshark
2. Rustscan&#x20;
3. Sx-Tool
4. Colasoft Packet Builder
5. Angry IP Scanner & Advanced IP Scanner
6. SuperEnum
7. Global Network Inventory
8. Active Directory Explorer (LDAP)
9. NetBIOS Enumerator
10. SMB Eagle
11. SMTPWalk

#### Vulnerability Assessment Tools :&#x20;

1. Nessus Vulnerability Scanner
2. OpenVAS Vulnerability Scanner -  Open Source
3. ZAProxy

#### System Hacking Tools :&#x20;

1. CrackMapExec
2. Ncat
3. Poverview
4. Impacket
5. Rubeus
6. WinPEAS
7. Immunity Debugger : Buffer Overflow tool
8. Vulnserver
9. Reverse Shell Generator&#x20;
10. Metasploit
11. Hashcat
12. Hydra
13. JohnTheRipper
14. Spyrix Spyware
15. OpenStego
16. Responder

#### Virus & Threats

1. Swayz Cryptor&#x20;

2. Chaos Ransomware Builder

3. HTTP Trojan

4. NjRAT

5. JPS Virus Maker

6. Internet Worm Maker thing

7. Malware Analysis Tools :&#x20;

   1. Static Malware Analysis Tools&#x20;
      1. CAPA
      2. Ghidra
      3. OllyDBG
      4. IDA Pro
      5. DIE
      6. PEid
      7. PE Studio
      8. PE extractor
   2. Dynamic Malware Analysis Tools :&#x20;
      1. API Monitor
      2. DNS  Query Sniffer
      3. FileSight Trial : File Monitoring Tool
      4. Mirekusoft Installation Monitor
      5. Currport
      6. TCP View&#x20;
      7. Process Monitor
      8. Reg Organizor
      9. Autorun for windows
      10. WinPetrol

8. File Backup & Imaging tools :&#x20;
   1. Disk Genius
   2. dd : linux image&#x20;
   3. R-Drive

#### Social Engineering Tools  :&#x20;

1. &#x20;Cain & ABEL
2. XARP
3. SMAC & TMAC
4. Social Engineering toolkit
5. Shellphish
6. Darkphish

#### Denial of Service (DoS & DDoS) :&#x20;

1. LOIC : Low orbit ion cannon
2. HOIC : High orbit ion cannon
3. ISB : Iam So Board
4. UltraDDoS
5. EagleDDos.py
6. AntiDDoS Guardian
7. PyDDoS
8. PyFlooder
9. Honeypot & IDS :&#x20;
   1. Snort
   2. Cowrie
   3. KFsensor
   4. HoneyBOT
10. Firewalls (Open Source) :&#x20;
    1. Sophos XG
    2. Pfsense
    3. Zone Alarm Free Firewall

#### Server , Session &  Web Application exploitation tools :&#x20;

1. CAIDO
2. Hetty
3. HTTP Tunneling&#x20;
   1. HTTP Host
   2. HTTP Port
4. HTTP Recon
5. SmartScanner
6. Vega Vulnerability Scanner (Web Application)
7. NStalker
8. JWT Server
9. SQL Injection Tools  :&#x20;
   1. DSSS
   2. Gauri
   3. SQL Map

#### Wireless & Mobile Application attacks :&#x20;

1. Aircrack-ng Cracking Suite
2. Sparrow Wifi
3. Microsoft Network Monitor
4. RougeHost APD
5. AndroRAT
6. PhoneSploit Pro&#x20;
7. ADB

#### Cloud , IOT & OT Hacking tools :&#x20;

1. Bitwise IOT Simulator
2. MicroSIP
3. ICSim
4. AADInternals&#x20;
5. Bucket-Flaws&#x20;
6. Cloudbrute&#x20;
7. Cloudfox&#x20;
8. Larys3-master&#x20;
9. S3Scanner
10. Trivy

#### Cryptography Tools :&#x20;

1. Veracrypt
2. Alphapeeler
3. Cryptool
4. Advanced Encryption Package
5. BC Text Encoder
6. Cryptoforage
7. Rohos Disk Encryption
8. HashCalc&#x20;
9. HashMyFiles&#x20;
10. MD5 Calculator
