Tools & Utility

33 articles

Information Gathering / DNS Enumeration

dnsEnum

A powerful multithreaded Perl script for DNS enumeration and information gathering.

Information Gathering / DNS Enumeration

Recon-ng

A powerful modular OSINT and reconnaissance framework with a Metasploit-like interface.

Information Gathering / DNS Enumeration

Dig

The Domain Information Groper (dig) is one of the most powerful command-line tools for querying DNS records.

Information Gathering / DNS Enumeration

Fierce

DNS reconnaissance tool for discovering subdomains, IP ranges, and network information of a target domain.

Information Gathering / DNS Enumeration

Sublist3r

Python tool for enumerating subdomains using OSINT techniques via multiple search engines and services.

Information Gathering / Fuzzing

Gobuster

A fast directory and DNS subdomain brute-forcing tool written in Go.

Information Gathering / Fuzzing

FFUF

Fast and flexible fuzzing tool for web applications written in Go.

Information Gathering / Network Discovery

Nmap

The ultimate network scanning tool for host discovery, port scanning, OS detection, and vulnerability assessment.

Information Gathering / Network Discovery

Netdiscover

Lightweight and efficient ARP scanning tool for network discovery on local networks.

Information Gathering / Network Discovery

WAFW00F

Web Application Firewall fingerprinting tool to detect and identify WAFs protecting web applications.

Information Gathering / Passive Recon

Google Dorks

Advanced Google search techniques for extracting sensitive information from websites using specialized operators.

Information Gathering / Passive Recon

theHarvester

Open-source OSINT tool for collecting emails, subdomains, IPs, and intelligence from public sources.

Information Gathering / Passive Recon

WhatWeb

Website fingerprinting tool for identifying web servers, CMS platforms, frameworks, and technologies.

Exploitation / Bruteforcing & Password Cracking

Hashcat

Advanced password recovery tool supporting GPU-accelerated cracking for hundreds of hash types.

Exploitation / Bruteforcing & Password Cracking

John The Ripper

Open-source password cracker supporting hundreds of hash and cipher types.

Exploitation / Bruteforcing & Password Cracking

Hydra

Fast and flexible online password brute-forcing tool supporting numerous protocols.

Exploitation / Bruteforcing & Password Cracking

CeWL

Custom wordlist generator that spiders a given URL and collects words to create a targeted wordlist.

Exploitation / Bruteforcing & Password Cracking

CUPP Password Generator

Common User Password Profiler - generates targeted wordlists based on personal information about the target.

Exploitation / DDoS

Slowloris

Low-bandwidth DDoS tool that keeps many connections to the target web server open as long as possible.

Exploitation

Metasploit Framework

The world's most used penetration testing framework for exploit development and vulnerability verification.

Exploitation

Netcat

The Swiss Army knife of networking - a versatile tool for reading and writing data across network connections.

Exploitation

Socat

Advanced networking utility that establishes bidirectional byte streams between two data channels.

Exploitation

Enum4linux

Tool for enumerating information from Windows and Samba systems (shares, users, groups, policies).

Exploitation

SQLMap

Automated SQL injection and database takeover tool.

Exploitation

Burp Suite

The leading web application security testing platform with proxy, scanner, and intruder tools.

Privilege Escalation / Linux

LinPEAS

Linux Privilege Escalation Awesome Script for finding possible paths to escalate privileges on Linux/Unix hosts.

Privilege Escalation / Linux

LinEnum

Linux enumeration script for privilege escalation that provides detailed system information.

Privilege Escalation / Linux

Linux Exploit Suggester

Tool that suggests possible kernel exploits based on the target's kernel version.

Privilege Escalation / Windows

WinPEAS

Windows Privilege Escalation Awesome Script for finding possible paths to escalate privileges on Windows hosts.

Privilege Escalation / Windows

PowerSploit

Collection of PowerShell post-exploitation modules for Windows penetration testing.

Privilege Escalation / Windows

JAWS

Just Another Windows (Enum) Script - PowerShell script for enumerating Windows systems.

C2 (Command & Control)

Cobalt Strike

Commercial adversary simulation platform used for red team operations and advanced penetration testing.

C2 (Command & Control)

Sliver

Open-source cross-platform adversary emulation and C2 framework written in Go.