Privacy & Cryptography
anonsurf
tor
i2p
zulucryptLUKS - truecrypt - veracrypt
macchanger
proxychainsInformation Gathering
penmode
nmap
geotweet
dmitry
maltego
spiderfootVulnerability Assessment
inurlbr
nikto
golismero
lynis
ike-skan
openvasWeb Apps Analysis
burpsuite
zaproxy
webscarab
vega
w3af
parosDatabase Analysis
sqlmap
sqlninja
hexorbase
sqlsus
bbqsql
dbpwaudit
jsqlExploitation Tools
metasploit
armitage
social engineering toolkit
beef
inguma
websploit
termineter
shellnoobMaintaining Access
backdoor-factory
weevely
veil-evasion
netcat, dbd and sbd
bdfproxy
nishangPassword Attacks
ophcrack
hydra
john & johnny
crunch
medusa
ncrack
pyritWiFi
airmode
aircrack-ng
fern wifi cracker
wifite
reaver
pixiewps
mdk3Wireless Testing
GNU Radio
chirp
bluemaho
spooftooph
redfang
rfidiot
mfocSniffing & Spoofing
wireshark
ettercap
mitmproxy
driftnet
hamster
responderDigital Forensics
DFF
foremost
autopsy
xplico
sleuthkit
scripts4cfReverse Engineering
edb debugger
ollydbg
GCC & clang
flasmr
radare2
jad
javasnoopReporting Tools
casefile
cutycapt
dradis
magictree
pipal
recordmydesktopMobile Hacking
android-sdk
dex2jar
apktoolCloud Pentesting
penmode3
Tutorial:

0 comments:
Post a Comment