Privacy & Cryptography
anonsurf
tor
i2p
zulucrypt
LUKS - truecrypt - veracrypt
LUKS - truecrypt - veracrypt
macchanger
proxychains
Information Gathering
penmode
nmap
geotweet
dmitry
maltego
spiderfoot
Vulnerability Assessment
inurlbr
nikto
golismero
lynis
ike-skan
openvas
Web Apps Analysis
burpsuite
zaproxy
webscarab
vega
w3af
paros
Database Analysis
sqlmap
sqlninja
hexorbase
sqlsus
bbqsql
dbpwaudit
jsql
Exploitation Tools
metasploit
armitage
social engineering toolkit
beef
inguma
websploit
termineter
shellnoob
Maintaining Access
backdoor-factory
weevely
veil-evasion
netcat, dbd and sbd
bdfproxy
nishang
Password Attacks
ophcrack
hydra
john & johnny
crunch
medusa
ncrack
pyrit
WiFi
airmode
aircrack-ng
fern wifi cracker
wifite
reaver
pixiewps
mdk3
Wireless Testing
GNU Radio
chirp
bluemaho
spooftooph
redfang
rfidiot
mfoc
Sniffing & Spoofing
wireshark
ettercap
mitmproxy
driftnet
hamster
responder
Digital Forensics
DFF
foremost
autopsy
xplico
sleuthkit
scripts4cf
Reverse Engineering
edb debugger
ollydbg
GCC & clang
flasmr
radare2
jad
javasnoop
Reporting Tools
casefile
cutycapt
dradis
magictree
pipal
recordmydesktop
Mobile Hacking
android-sdk
dex2jar
apktool
Cloud Pentesting
penmode3
Tutorial:
0 comments:
Post a Comment