Penetration Testing Tools

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/54

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

55 Terms

1
New cards

Hashcat

A GPU-accelerated password-cracking tool that supports brute-force, dictionary, and rule-based attacks against hashes (e.g., MD5, SHA-256, NTLM).

2
New cards

John the Ripper

A flexible password-cracking tool that detects weak passwords using multiple attack modes (wordlist, incremental, hybrid).

3
New cards

Mimikatz

Extracts plaintext credentials, Kerberos tickets, and hashes from Windows memory (LSASS) for lateral movement in post-exploitation.

4
New cards

Patator

A brute-force tool for protocols like SSH, FTP, and SMTP, with granular control over payloads and error handling.

5
New cards

Hydra

A fast network login cracker that brute-forces credentials across protocols (e.g., HTTP, RDP, SMB).

6
New cards

Burp Suite

A web proxy tool for intercepting, modifying, and testing web app vulnerabilities (e.g., SQLi, XSS, CSRF).

7
New cards

OWASP ZAP

An open-source web app scanner that identifies vulnerabilities like insecure headers, XSS, and broken authentication.

8
New cards

Nmap

A network exploration tool for host discovery, port scanning, OS fingerprinting, and vulnerability detection via scripts.

9
New cards

Nessus

A vulnerability scanner that identifies CVEs, misconfigurations, and compliance issues in networks and applications.

10
New cards

BeEF (Browser Exploitation Framework)

Hijacks browsers to launch client-side attacks (e.g., phishing, keylogging) via JavaScript hooks.

11
New cards

SQLmap

Automates SQL injection detection, database fingerprinting, and data exfiltration (e.g., dumping tables, executing commands).

12
New cards

DirBuster

Discovers hidden directories/files on web servers by brute-forcing paths (e.g., /admin, /backup.zip).

13
New cards

Metasploit

A framework for developing, testing, and deploying exploits (e.g., reverse shells, privilege escalation modules).

14
New cards

OpenVAS

Scans networks for vulnerabilities (e.g., unpatched software, weak credentials) using a database of 50,000+ tests.

15
New cards

Cain and Abel

Recovers passwords via sniffing, ARP poisoning, and brute-force attacks (e.g., VoIP, wireless).

16
New cards

Medusa

A parallelized login brute-forcer for protocols like HTTP, SSH, and FTP.

17
New cards

SearchSploit

Command-line tool to search the Exploit-DB database for public exploits.

18
New cards

Netcat

A networking utility for reading/writing data across TCP/UDP connections (e.g., port scanning, file transfers).

19
New cards

GDB (GNU Debugger)

Analyzes program crashes, memory leaks, and assembly code for reverse engineering.

20
New cards

Responder

Poisons LLMNR/NBT-NS requests to capture NTLMv2 hashes in Windows environments.

21
New cards

Impacket

A Python library for crafting packets and exploiting protocols like SMB, Kerberos, and LDAP.

22
New cards

Empire

A post-exploitation framework using PowerShell agents for lateral movement and persistence.

23
New cards

PowerSploit

A collection of PowerShell scripts for privilege escalation, reconnaissance, and code execution.

24
New cards

BloodHound

Visualizes Active Directory attack paths (e.g., privilege escalation via group membership).

25
New cards

Drozer

Assesses Android app security by exploiting insecure components (e.g., exposed activities, content providers).

26
New cards

Covenant

A .NET command-and-control (C2) framework for red team operations.

27
New cards

Cobalt Strike

A commercial red-team toolkit for spear phishing, lateral movement, and C2 emulation.

28
New cards

Reaver

Cracks Wi-Fi passwords by exploiting weak WPS PINs on routers.

29
New cards

Gattacker

Exploits Git repositories by spoofing commits or injecting malicious code.

30
New cards

EAPHammer

Conducts evil twin attacks against WPA2-Enterprise networks (e.g., stealing RADIUS credentials).

31
New cards

Scout Suite

Audits cloud environments (AWS, Azure, GCP) for misconfigured storage, IAM policies, and logging.

32
New cards

Cloud Custodian

Automates cloud security policies (e.g., deleting unattached volumes, encrypting S3 buckets).

33
New cards

CloudBrute

Discovers misconfigured cloud storage (e.g., open S3 buckets, Azure blobs) via brute-force.

34
New cards

Pacu

Exploits AWS vulnerabilities (e.g., privilege escalation, data exfiltration).

35
New cards

Frida

A dynamic instrumentation toolkit for reverse-engineering and hooking mobile/app functions.

36
New cards

Brakeman

A static analysis tool for Ruby on Rails apps to detect vulnerabilities (e.g., SQLi, XSS).

37
New cards

ChopChop

Tests Wi-Fi encryption (e.g., WEP) by forging packets and analyzing responses.

38
New cards

hping3

Crafts custom TCP/IP packets for firewall testing, network mapping, and DoS attacks.

39
New cards

Scapy

A Python library for crafting, sending, and decoding network packets (e.g., ARP spoofing).

40
New cards

MDK4

A Wi-Fi tool for deauthentication attacks, beacon flooding, and AP disruption.

41
New cards

Wifite

Automates Wi-Fi attacks (e.g., cracking WPA, deauth attacks) against multiple targets.

42
New cards

Cowpatty

Brute-forces WPA-PSK passwords using precomputed PMK hashes for faster cracking.

43
New cards

Bluecrack

Audits Bluetooth devices for vulnerabilities (e.g., pairing flaws, data leakage).

44
New cards

ProxyChains

Routes traffic through proxies to anonymize scans/attacks (e.g., hiding source IP).

45
New cards

WinDbg/OllyDbg

Debuggers for analyzing Windows binaries, memory dumps, and exploits.

46
New cards

Android SDK Tools

A suite for developing and testing Android apps (e.g., ADB for device access).

47
New cards

MobSF (Mobile Security Framework)

Scans Android/iOS apps for vulnerabilities (e.g., insecure storage, code leaks).

48
New cards

Snow

A steganography tool for hiding data in text files via whitespace manipulation.

49
New cards

TinEye

A reverse image search engine to track image origins and detect impersonation.

50
New cards

Censys

Discovers internet-connected devices and services using certificate, port, and protocol data.

51
New cards

Recon-ng

A web reconnaissance framework for OSINT (e.g., harvesting emails, subdomains).

52
New cards

Maltego

Visualizes relationships between entities (e.g., domains, IPs, people) using OSINT data.

53
New cards

Gobuster

Brute-forces web directories, DNS subdomains, and S3 buckets.

54
New cards

TruffleHog

Scans Git repositories for exposed secrets (e.g., API keys, passwords).

55
New cards

Postman Collection

A tool for testing and documenting API endpoints (e.g., fuzzing parameters).