Used Tools
Nmap
Nmap is a powerful network scanning and security auditing tool. It's used to discover devices, open ports, and running services on a network.
Metasploit
Metasploit a penetration-testing framework for running exploits and payloads. Use only on systems you own or have permission to test.
Burp Suite
Burp Suite an integrated web-application security testing toolkit (proxy, scanner, repeater) used to intercept, analyze, and exploit HTTP/S traffic.
Nessus
Nessus a vulnerability scanner that detects missing patches, misconfigurations, and known CVEs use only on systems you own or are authorized to test.
Hydra
Hydra a fast parallelized login-brute-force tool for testing password strength against services (SSH, FTP, HTTP forms, etc.). Use only on systems you own or are authorized to test.
Wireshark
Wireshark a GUI packet analyzer that captures and inspects network traffic (packets) for troubleshooting, protocol analysis, and forensic investigation.
Hashcat
Hashcat: a high-performance password-recovery and cracking tool that uses CPU/GPU acceleration to brute-force or use wordlists against hashed passwords (MD5, bcrypt, NTLM, etc.).
Autopsy
Autopsy: a graphical digital-forensics platform for analyzing disk images, recovering files, and investigating timestamps/artifacts during incident response use only on systems/images you have authorization to examine.
Aircrack-ng
Aircrack-ng a suite for auditing WiFi: capture packets, extract handshakes, and crack WEP/WPA/WPA2 PSKs using wordlists/GPU acceleration.
SET Toolkit
SET an open-source framework for automating social-engineering attacks (phishing, credential harvesting, payload delivery) to test human vectors.
Maltego
Maltego an open-source intelligence (OSINT) and forensics application that provides data mining and link analysis for gathering information about people, companies, domains, and infrastructure.
OWASP ZAP
OWASP ZAP a leading open-source web application security testing tool that provides automated scanning and manual testing capabilities for identifying vulnerabilities in web applications.
SQLMap
SQLMap an open-source penetration-testing framework for automating SQL injection attacks and database takeover.
John the Ripper
John the Ripper a fast and flexible password recovery tool that supports various hash formats and can be used for both offensive and defensive purposes.
Nikto
Nikto a web server scanner that performs comprehensive checks for potential security vulnerabilities, outdated software versions, and misconfigurations.