1. aircrack-ng A suite of tools used for wireless network security assessment, including monitoring, attacking, and cracking.
2. airgeddon A Wi-Fi security suite, featuring multiple functionalities for attacking, auditing, and monitoring Wi-Fi networks.
3. airgraph-ng A tool that generates visual graphs of captured wireless data, providing insights into network traffic patterns.
4. amass A domain mapping and vulnerability identification tool that gathers information about an organization’s internet assets.
5. arjun A script enumeration tool that identifies and exploits potentially insecure parameters in web applications.
6. arpwatch A utility for monitoring Address Resolution Protocol (ARP) tables and alerting when new devices are detected on the network.
7. asset finder A reconnaissance tool used for discovering subdomains and related assets of a target domain.
8. autopsy A digital forensics tool that helps analyze and recover data from hard drives and other storage devices.
9. beef-xss A browser exploitation framework designed to exploit browser vulnerabilities and run various payloads.
10. bettercap A network reconnaissance and attack utility supporting a wide range of protocols and features.
11. btscanner A Bluetooth device scanner used to extract information from Bluetooth-enabled devices within range.
12. burpsuite A powerful web application security testing tool that includes a range of features for scanning and intercepting HTTP requests.
13. chntpw A utility for resetting passwords on Windows NT/2000/XP/2003/Vista/7 systems by modifying the Security Account Manager (SAM) files.
14. cisco-torch A tool designed for discovering and exploiting vulnerabilities in Cisco routers and network devices.
15. commix A tool aimed at detecting and exploiting command injection vulnerabilities in web applications.
16. crunch A wordlist generation tool that creates custom dictionaries for password-cracking activities.
17. cryptsetup A utility for creating and managing encrypted filesystems based on the Linux Unified Key Setup (LUKS) specification.
18. cryptsetup-suspend A wrapper for cryptsetup that suspends and resumes LUKS-encrypted filesystems during system hibernation.
19. dirbuster A multi-threaded directory and file enumeration tool used to discover hidden directories and files within a web server.
20. dirsearch A simple script for brute-forcing directories and files on web servers.
21. dmitry A network security scanner that performs a wide range of information gathering tasks, such as banner grabbing and email address harvesting.
22. dnsenum A DNS enumeration tool that extracts domain information, such as DNS records and zone transfers.
23. dnsrecon A tool for performing DNS reconnaissance, including enumeration, record lookups, and reverse lookups.
24. driftnet A utility for intercepting and displaying images from network traffic.
25. dvwa A web application designed for practicing web application security testing techniques in a legal environment.
26. ettercap A network sniffer and man-in-the-middle attack tool supporting various protocols and offering various plugins for additional functionality.
27. evil-winrm A Windows Remote Management (WinRM) shell for easily connecting and executing commands on remote Windows systems.
28. fern-wifi-cracker An auditing and attack tool for Wi-Fi networks, featuring an easy-to-use GUI and automation options.
29. ffuf A fast web fuzzer used to discover resources, directories, and vulnerabilities in web applications.
30. fierce A DNS reconnaissance tool that quickly identifies non-contiguous IP address spaces and hostnames for a given domain.
31. foremost A data carving tool for recovering deleted data based on file headers, footers, and internal data structures.
32. ghidra A reverse engineering tool for analyzing binary files, including disassembly, decompilation, and scripting capabilities.
33. gobuster A directory, file, and DNS subdomain bruteforcing tool written in Go.
34. goldeneye An HTTP denial of service (DoS) attack tool that targets web servers.
35. guymager A disk imaging tool used for forensic acquisition and recovery of data from storage devices.
36. hakrawler A web crawler and reconnaissance tool for discovering information about web applications, such as subdomains and URL paths.
37. hashcat A fast and advanced password recovery tool that supports various hashing algorithms.
38. hping3 A network tool for crafting custom packets, scanning, testing firewalls, and performing traceroutes.
39. httrack A website mirroring and offline browser utility that downloads entire websites for offline browsing.
40. jadx A reverse engineering tool that decompiles Android APK files to Java source code.
41. john A powerful and flexible password-cracking tool, also known as John the Ripper, designed for detecting weak passwords.
42. hashcat A powerful and versatile password recovery tool that supports various hashing algorithms and can be used for cracking hashes in an efficient manner.
43. hping3 A network tool that can generate custom packets, identify open ports, test firewalls, and perform traceroutes, among other functions.
44. httrack A website downloader that can mirror whole websites and make them available for offline browsing.
45. jadx A reverse engineering tool that can decompile Android APK files into Java source code, making it easier to analyze and understand the application.
46. john Also known as John the Ripper, it is a popular password-cracking tool that can identify weak passwords across various hashing algorithms.
47. johnny A graphical interface for John the Ripper, making it user-friendly and easy to manage the password cracking process.
48. king-phisher A phishing campaign toolkit that allows security researchers and penetration testers to create and manage realistic phishing simulations.
49. kismet A wireless network detection, monitoring, and intrusion detection system that can sniff 802.11a/b/g/n networks and offer various insights.
50. legion An automated network reconnaissance tool that discovers potential vulnerabilities and weaknesses in a network infrastructure.
51. libcryptsetup-dev A development library for cryptsetup, which is used for creating and managing encrypted filesystems based on the Linux Unified Key Setup (LUKS) specification.
52. libcryptsetup12 A runtime library for cryptsetup, providing the necessary support to interact with encrypted filesystems.
53. libregfi-dev A development library for interacting with Windows Registry File (REGF) format files.
54. libregfi1 A runtime library for interacting with Windows Registry File (REGF) format files.
55. lynis A security and system auditing tool that helps in hardening Linux and Unix systems by identifying potential misconfigurations and security weaknesses.
56. macchanger A utility for changing a network device's MAC address, useful in bypassing network filters and enhancing privacy.
57. maltego A data analysis and link analysis tool that provides insight into the relationships and real-world connections between data points.
58. masscan A fast and flexible port scanning utility used for identifying open network services and analyzing network security.
59. medusa A parallelized and modular login brute-forcing tool, supporting a wide range of protocols, including FTP, HTTP, SMB, and more.
60. metagoofil An information gathering and metadata extraction tool that can search and download documents from public websites.
61. metasploit-framework A popular penetration testing framework that simplifies the process of exploiting known vulnerabilities in networks and systems.
62. mimikatz A credential harvesting tool that can extract plaintext passwords and Kerberos tickets from Windows systems.
63. nbtscan A tool for scanning NetBIOS networks and extracting information about hosts and their services.
64. ncat A modern incarnation of the classic netcat tool, offering enhanced functionality and support for various protocols.
65. ndiff A utility that compares the results of two Nmap scans to identify differences in network configuration or security.
66. netcat A versatile networking tool used for reading and writing data across network connections with support for various protocols.
67. netdiscover A network scanning tool that uses ARP requests to identify live hosts and devices on a network.
68. nmap A widely used network scanning and auditing tool used for discovering hosts, services, and vulnerabilities on a network.
69. nuclei A fast and configurable template-based vulnerability scanner for web applications, APIs, and infrastructure.
70. ollydbg A Windows-based debugger used for reverse engineering and analyzing binary files, including malware and executables.
71. parsero A web server log parsing tool that can identify potential vulnerabilities and information leaks from incorrectly configured servers.
72. pipal A password analysis tool that can generate statistics and insight into the strength and patterns of user passwords.
73. powershell A scripting language and automation framework developed by Microsoft for managing and automating tasks on Windows systems.
74. python3-pyregfi A Python library for interacting with and parsing Windows Registry File (REGF) format files.
75. rainbowcrack A password hashing and time-memory tradeoff tool that uses precomputed tables (rainbow tables) to speed up the password cracking process.
76. recon-ng A powerful web reconnaissance framework that can discover and analyze data about hosts, domains, and IP addresses.
77. redeye A command-line tool used for automating the process of discovering subdomains by leveraging certificate transparency logs.
78. reglookup A command-line tool for investigating the contents of Windows Registry files by providing structured query support.
79. ruzle An advanced wordlist generator and manipulation tool that can create custom dictionary files for password cracking and brute-forcing tasks.
80. responder A network analysis tool that can intercept and respond to different authentication protocols, effectively helping in LAN-based penetration testing and credential harvesting.
81. rkhunter A rootkit scanning tool that checks Linux and Unix systems for the presence of known rootkits, backdoors, and suspicious files.
82. scalpel A file carving tool used for recovering deleted data from various filesystems by scanning for identifiable file signatures.
83. set Short for Social-Engineer Toolkit, it is a collection of tools and techniques designed to target human behavior through phishing, spear phishing, and other social engineering attacks.
84. sherlock A tool that searches for usernames across multiple social networks, which aids in uncovering the digital footprint of a target user.
85. skipfish A web application scanning tool that can analyze websites for potential vulnerabilities, misconfigurations, and security weaknesses.
86. socat A versatile network utility that can create bidirectional data transfers between two addresses and supports a wide range of protocols.
87. sqlmap A popular tool for detecting and exploiting SQL injection vulnerabilities in web applications, allowing attackers to interact with the targeted database.
88. sslstrip A man-in-the-middle (MITM) attack tool that can intercept and modify HTTPS requests, effectively downgrading them to HTTP and allowing the capture of sensitive information.
89. steghide A steganography utility that can hide sensitive data within images or audio files without visibly altering the file structure.
90. subfinder A subdomain discovery tool that uses a combination of passive sources, web scraping, and other techniques to identify subdomains related to a target domain.
91. sublist3r A Python-based tool used for enumerating subdomains of a given domain by leveraging OSINT and search engine data.
92. tcpdump A widely used network packet sniffer that can capture and display live network traffic, allowing for protocol analysis and troubleshooting.
93. testdisk A powerful data recovery tool used for restoring lost partitions, recovering deleted files, and repairing damaged filesystems.
94. theharvester An information-gathering tool for discovering email addresses, subdomains, IP addresses, and other data related to a target domain.
95. webhttrack The web-based version of the popular HTTrack website mirroring tool, enabling users to download entire websites for offline browsing.
96. wfuzz A web application vulnerability scanner and fuzzer that can discover security issues and vulnerabilities in web applications by testing various input parameters.
97. whatweb A website fingerprinting tool that identifies web technologies and versions, web server platforms, CMS software, and other relevant information about a target website.
98. wifiphisher A Wi-Fi phishing tool used for capturing WPA/WPA2 passwords, creating rogue access points, and performing man-in-the-middle attacks.
99. wifite An automated tool for attacking, auditing, and cracking Wi-Fi networks to test and improve wireless network security.
100. wireshark A popular network protocol analyzer that can capture and analyze live network traffic, allowing deeper insights into network communication and performance.
101. wordlists Collections of strings and phrases commonly used for password cracking, brute-force attacks, and dictionary attacks against authentication mechanisms.
102. wpscan A WordPress vulnerability scanning tool designed to identify security issues, outdated plugins, and other potential weak spots in a WordPress website.
103. xsser An automated tool for detecting and exploiting cross-site scripting (XSS) vulnerabilities in web applications.