HACKING TOOLS

Network Tools

Discovery, scanning and network analysis utilities.

Nmap

Network Scanner

Network exploration tool and security scanner for discovering hosts and services.

Port ScanningService Detection
Learn Now Learn More →

Amass

DNS & Subdomain Discovery

Powerful reconnaissance tool for DNS enumeration and subdomain discovery.

OSINTEnumeration
Learn Now Learn More →

Wireshark

Network Protocol Analyzer

Capture and analyze network traffic with deep protocol inspection.

Packet CaptureInspection
Learn Now Learn More →

Responder

Network Poisoning

LLMNR/NBT-NS/MDNS poisoner for capturing network credentials on Windows networks.

Credential CapturePoisoning
Learn Now Learn More →

Enum4linux

SMB Enumeration

Enumerate shares, users and policies from Windows and Samba hosts.

SMBEnumeration
Learn Now Learn More →

Web & Application Security

Tools for web testing, scanning and application security.

Burp Suite

Web Application Security

Integrated platform for testing web applications with proxy, scanner and intruder.

ProxyScanner
Learn Now Learn More →

OWASP ZAP

Web App Security

Open-source web application scanner for finding vulnerabilities.

Active ScanPassive Scan
Learn Now Learn More →

Sqlmap

SQL Injection

Automated tool for detecting and exploiting SQL injection flaws.

SQLiAutomation
Learn Now Learn More →

Nikto

Web Server Scanner

Performs comprehensive tests against web servers for vulnerabilities.

Server ScanVulnerabilities
Learn Now Learn More →

Gobuster

Directory Brute Forcer

Fast directory and DNS brute-forcing tool written in Go.

EnumerationFast
Learn Now Learn More →

Exploitation & Frameworks

Frameworks and tools for exploitation and post-exploitation.

Metasploit

Exploitation Framework

Framework for developing and executing exploits against remote targets.

ExploitationPayloads
Learn Now Learn More →

BeEF

Browser Exploitation

Browser Exploitation Framework focusing on client-side vectors.

XSSClient-Side
Learn Now Learn More →

Recon-ng

Reconnaissance Framework

Modular web reconnaissance framework for OSINT gathering.

OSINTModules
Learn Now Learn More →

Wireless Security

Tools focused on wireless network assessment and cracking.

Aircrack-ng

Wireless Security

Suite for assessing Wi‑Fi security: capture, injection and cracking.

WiFiCracking
Learn Now Learn More →

Password & Cracking

Tools for password recovery, hash cracking and brute force.

John the Ripper

Password Cracker

Fast password cracker for many hash types and modes.

CrackingDictionary
Learn Now Learn More →

Hashcat

Password Recovery

GPU-accelerated password recovery tool for many hash algorithms.

GPUMulti-Hash
Learn Now Learn More →

Hydra

Login Cracker

Fast login cracker supporting many protocols for password auditing.

Brute ForceMulti-Protocol
Learn Now Learn More →

Scanners & Vulnerability

Automated scanners and vulnerability assessment tools.

Nessus

Vulnerability Scanner

Comprehensive vulnerability scanner for identifying security issues and compliance gaps.

VulnerabilitiesCompliance
Learn Now Learn More →

OSINT & Analysis

Tools for intelligence gathering, reverse engineering and analysis.

Maltego

OSINT & Forensics

Interactive data mining and link analysis tool for intelligence gathering.

OSINTLink Analysis
Learn Now Learn More →

Ghidra

Reverse Engineering

NSA open-source reverse engineering framework for static analysis.

Reverse EngineeringStatic Analysis
Learn Now Learn More →

Radare2

Reverse Engineering

Lightweight reverse engineering toolkit and disassembler for binary analysis.

REDisassembler
Learn Now Learn More →

Frida

Dynamic Instrumentation

Dynamic instrumentation toolkit for hooking and tampering with applications at runtime.

InstrumentationRuntime
Learn Now Learn More →

Misc & Forensics

Other useful security and forensic tools.

Mimikatz

Credential Dumping

Post-exploitation tool for extracting credentials and Kerberos tickets from memory.

WindowsCredentials
Learn Now Learn More →

TruffleHog

Secrets Scanning

Searches git repositories for high-entropy strings and secrets.

SecretsGit
Learn Now Learn More →

Master These Tools

Practice makes perfect. Start learning and experimenting with these powerful security tools.