Hacking tools

Exploitation tools

Password attacks

$ cewl
copy
$ john
copy

Forensics

Sniffing/Spoofing

Information gathering

$ nmap
copy

Vulnerability analyses

$ nmap
copy

Web application analysis

Databases

Wireless attack

$ cewl
copy
$ mfoc
copy

Reporting tools

Copied to clipboard
Coindodo