Kali Linux
1. Top 10Security Tools:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
2. Information Gathering
2.1 DNS Analysis
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.7
2.1.8
2.1.9
2.1.10
2.1.11
2.1.12
Aircrack-ng
Burpsuite
Hydra
Jonh
Maltego
Metasploit framework
Nmap
sqlmap
Wireshark
Zaproxy
dnsdict6
dnsenum
dnsmap
dnsrecon
dnsrevenum6
dnstracer
dnswalk
fierce
maltego
nmap
urlcrazy
zenmap
2.2 IDS/IPS Identification
2.2.1 fragroute
2.2.2 fragrouter
2.2.3 ftest
2.2.4 lbd
2.2.5 wafw00f
2.3 Live Host Identification
2.3.1 alive6
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.3.9
2.3.10
2.3.11
2.3.12
2.3.13
2.3.14
2.3.15
2.3.16
2.3.17
2.3.18
2.3.19
2.3.20
arping
cdpsnarf
dedect-new-ip6
dedect_sniffer6
dmitry
dnmap-client
dnmap-server
fping
hping3
inverse_lookup6
miranda
ncat
netdiscover
nmap
passive_discovery6
thcping6
wol-e
xprobe2
zenmap
2.4 Network Scanners
2.4.1 dmitry
2.4.2 dnmap-client
2.4.3 dnmap-server
2.4.4 netdiscover
2.4.5 nmap
2.4.6 zenmap
2.5 OS Fingerprinting
2.5.1 dnmap-client
2.5.2 dnmap-server
2.5.3 miranda
2.5.4 nmap
2.5.5 zenmap
2.6 OSINT Analysis
2.6.1 casefile
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.6.7
2.6.8
2.6.9
2.7 Route Analysis
2.7.1
2.7.2
2.7.3
2.7.4
2.7.5
2.7.6
creepy
dmitry
jigsaw
maltego
metagoofil
theharvester
twofi
urlcrazy
0trace
dnmap-client
dnmap-server
intrace
netmask
trace6
2.8 Service Fingerprinting
2.8.1 dnmap-client
2.8.2 dnmap-server
2.8.3 implementation6
2.8.4 implemantation6d
2.8.5 ncat
2.8.6 nmap
2.8.7 sslscan
2.8.8 sslyze
2.8.9 tlssled
2.8.10 zenmap
2.9 SMB Analysis
2.9.1
2.9.2
2.9.3
2.9.4
acccheck
nbtscan
nmap
zenmap
2.10
SMTP Analysis
2.10.1 nmap
2.10.2 smtp-user-enum
2.10.3 swaks
2.10.4 zenmap
2.11
SNMP Analysis
2.11.1 braa
2.11.2 cisco-auditing-tool
2.11.3 cisco-torch
2.11.4 copy-router-config
2.11.5 merge-router-config
2.11.6 nmap
2.11.7 onesixtyone
2.11.8 snmpcheck
2.11.9 zenmap
2.12
SSL Analysis
2.12.1 sslcaudit
2.12.2 ssldump
2.12.3 sslh
2.12.4 sslscan
2.12.5 sslsniff
2.12.6 sslstrip
2.12.7 sslyze
2.12.8 stunnel4
2.12.9 tlssled
2.13
Telephony Analysis
2.13.1 ace
2.14
Traffic Analysis
2.14.1 0trace
2.14.2 Cdpsnarf
2.14.3 Ftest
2.14.4 Intrace
2.14.5
2.14.6
2.14.7
2.14.8
irpas-ass
irpass-cdp
p0ftcplow
wireshark
2.15
VoIP Analysis
2.15.1 ace
2.15.2 enumiax
2.16
VPN Analysis
2.16.1 ike-scan
3. Vulnerability Analysis
3.1 Cisco Tools
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
cisco-auditing-tool
cisco-global-exploiter
cisco-ocs
cisco-torch
yersinia
3.2 Databse Assessment
3.2.1 bbqsql
3.2.2 dbpwaudit
3.2.3 hexorbase
3.2.4 mdb-export
3.2.5 mdb-hexdump
3.2.6 mdb-parsecsv
3.2.7 mdb-sql
3.2.8 mdb-tables
3.2.9 oscanner
3.2.10 sidguesser
3.2.11 sqldict
3.2.12 sqlmap
3.2.13 sqlninja
3.2.14 sqlsus
3.2.15 tnscmd10g
3.3 Fuzzing Tools
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8
3.3.9
3.3.10
bed
fuzz_ip6
ohrwurm
powerfuzzer
sfuzz
siparmyknife
spike-generic_chunked
spike_generic_listen_tcp
spike_generic_send_tcp
spike_generic_send_udp
3.4 Misc Scanners
3.4.1
3.4.2
3.4.3
3.4.4
3.4.5
lynis
nikto
nmap
unix-privesc-check
zenmap
3.5 Open Source Assessment
3.5.1 casefile
3.5.2 maltego
3.6 OpenVAS
3.6.1
3.6.2
openvas-gsd
openvas-setup
4. Web Applications
4.1 CMS Identification
4.1.1 blindelephant
4.1.2 plecost
4.1.3 wpscan
4.2 Database exploitation
4.2.1 bbqsql
4.2.2 sqlninja
4.2.3 sqlsus
4.3 IDS/IPS Identification
4.3.1 ua-tester
4.4 Web Application Fuzzers
4.4.1 burpsuite
4.4.2 powerfuzzer
4.4.3 webscarab
4.4.4 webslayer
4.4.5 websploit
4.4.6 wfuzz
4.4.7 xsser
4.4.8 zaproxy
4.5 Web Application Proxies
4.5.1 burpsuite
4.5.2 paros
4.5.3 proxystrike
4.5.4 vega
4.5.5 webscarab
4.5.6 zaproxy
4.6 Web Crawlers
4.6.1
4.6.2
4.6.3
4.6.4
4.6.5
4.6.6
4.6.7
4.6.8
4.6.9
apache-users
burpsuite
cutycapt
dirb
dirbuster
vega
webscarab
webslayer
zaproxy
4.7 Web Vulnerability Scanners
4.7.1 arachni_web
4.7.2 burpsuite
4.7.3 cadaver
4.7.4 davtest
4.7.5 deblze
4.7.6 fimap
4.7.7 grabber
4.7.8 joomscan
4.7.9 nikto
4.7.10 padbuster
4.7.11 proxystrike
4.7.12 skipfish
4.7.13 sqlmap
4.7.14 uniscan-gui
4.7.15 vega
4.7.16 w3af
4.7.17 wapiti
4.7.18 webscarab
4.7.19 webshag-gui
4.7.20 websploit
4.7.21 whatweb
4.7.22 wpscan
4.7.23 xsser
4.7.24 zaproxy
5. Password Attacks
5.1 GPU Tools
5.1.1
5.1.2
5.1.3
oclhashcat-lite
oslhashcat-plus
pyrit
5.2 Offline Attacks
5.2.1 cachedump
5.2.2 chntpw
5.2.3 cmospwd
5.2.4
5.2.5
5.2.6
5.2.7
5.2.8
5.2.9
5.2.10
5.2.11
5.2.12
5.2.13
5.2.14
5.2.15
5.2.16
5.2.17
5.2.18
5.2.19
5.2.20
5.2.21
5.2.22
5.2.23
5.2.24
5.2.25
5.2.26
5.2.27
5.3 Online Attacks
5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
5.3.6
5.3.7
5.3.8
5.3.9
5.3.10
5.3.11
5.3.12
5.3.13
5.3.14
crunch
dictstat
fcrackzip
hashcat
hash-identifier
john
johnny
lsadump
maskgen
multiforcer
oclhashcat-lite
oclhashcat-plus
ophcrack
ophcrack-cli
policygen
pwdump
pyrit
rainbowcrack
rcracki_mt
rsmangler
samdump2
sipcrack
sucrack
truecrack
acccheck
burpuite
cewl
cisco-auditing-tool
dbpwaudit
findmyhash
hydra
hydra-gtk
keimpx
medusa
ncrack
onesixtyone
patator
phrasendrescher
5.3.15 thc-pptp-bruter
5.3.16 webscarab
5.3.17 zaproxy
6. Wireless Attacks
6.1 Bluetooth Tools
6.1.1 bluelog
6.1.2 bluemaho
6.1.3 blueranger
6.1.4 btscanner
6.1.5 fang
6.1.6 fang
6.1.7 spooftooph
6.2 Other Wireless Tools
6.2.1 zbassocflood
6.2.2 zbconvert
6.2.3 zbdsniff
6.2.4 zbdump
6.2.5 zbfind
6.2.6 zbgoodfind
6.2.7 zbreplay
6.2.8 zbstumbler
6.3 RFID/NFC Tools
6.3.1 NFC Tools
6.3.1.1
6.3.1.2
6.3.1.3
6.3.1.4
6.3.1.5
6.3.2
mfcuk
mfoc
mifare-classic-format
nfc-list
nfc-mfclassic
RFIDiot ACG
6.3.2.1 brute force hitag2
6.3.2.2 bruteforce mifare
6.3.2.3 calculate jcop mifare keys
6.3.2.4 continuous select tag
6.3.2.5 copy iso15693 tag
6.3.2.6 epassport read write clone
6.3.2.7 format mifare 1k value blocks
6.3.2.8 identify hf tag type
6.3.2.9
identify lf tag type
6.3.2.10
jcop info
6.3.2.11
jcop mifare read write
6.3.2.12
jcop set atr historical bytes
6.3.2.13
read acg reader eeprom
6.3.2.14
read lf tag
6.3.2.15
read mifare
6.3.2.16
read tag
6.3.2.17
read write clone unique(em4x02)
6.3.2.18
reset q5 tag
6.3.2.19
select tag
6.3.2.20
set fdx-b id
6.3.2.21
test acg lahf
6.3.3
RFIDiot FROSCH
6.3.3.1 read write clone unique (em4x02)
6.3.3.2 reset hitag2 tag
6.3.3.3 set fdx-b id
6.3.3.4 test frosch reader
6.3.4
RFIDiot PCSC
6.3.4.1
6.3.4.2
6.3.4.3
6.3.4.4
6.3.4.5
6.3.4.6
6.3.4.7
6.3.4.8
6.3.4.9
6.3.4.10
6.3.4.11
6.3.4.12
bruteforce mifare
calculate jcop mifare keys
chip&pin info
continuous select tag
epassport read/write/clone
identify hf tag type
jcop info
jcop mifare read/write
jcop set atr historical bytes
Read mifare
Read tag
Select tag
6.4 Wireless
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.4.9
6.4.10
6.4.11
6.4.12
6.4.13
6.4.14
6.4.15
6.4.16
6.4.17
aircrack-ng
asleap
bully
cowpatty
eapmd5pass
fern-wifi-cracker
genkeys
genpmk
giskismet
kismet
mdk3
wifiarp
wifidns
wifi-honey
wifiping
wifitap
wifite
7. Exploitation Tools
7.1 BeEF XSS Framework
7.1.1 beef
7.2 Cisco Attacks
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
cisco-auditing-tool
cisco-global-exploitler
cisco-ocs
cisco-torch
yersinia
7.3 Exploit Database
7.3.1 searchsploit
7.4 Metasploit
7.4.1
7.4.2
7.4.3
metasploit community/pro
metasploit diagnostic logs
metasploit diagnostic shell
7.4.4
7.4.5
metasploit framework
update metasploit
7.5 Network Exploitation
7.5.1 armitage
7.5.2 exploit6
7.5.3 ikat
7.5.4 jboss-autopwn-linux
7.5.5 jboss-autopwn-win
7.5.6 termineter
7.6 Social Engineering Toolkit
7.6.1 se-toolkit
8. Sniffing/Spoofing
8.1 Network Sniffers
8.1.1 darkstat
8.1.2 dnschef
8.1.3 dnsspoof
8.1.4 dsniff
8.1.5 ettercap-graphical
8.1.6 hexinject
8.1.7 mailsnarf
8.1.8 msgsnarf
8.1.9 netsniff-ng
8.1.10 passive_discovery6
8.1.11 responder
8.1.12 sslsniff
8.1.13 tcpflow
8.1.14 urlsnarf
8.1.15 webmitm
8.1.16 webspy
8.1.17 wieshark
8.2 Network Spoofing
8.2.1 dnschef
8.2.2 ettercap-graphical
8.2.3 evilgrade
8.2.4 fake_advertise6
8.2.5 fake_dhcps6
8.2.6 fake_dns6d
8.2.7 fake_dnsupdate6
8.2.8 fake_mipv6
8.2.9 fake_mld26
8.2.10 fake_mld6
8.2.11 fake_mldrouter6
8.2.12 fake_router6
8.2.13 fake_solicitate6
8.2.14 fiked
8.2.15 macchanger
8.2.16 parasite6
8.2.17 randicmp6
8.2.18 rebind
8.2.19 redir6
8.2.20 responder
8.2.21 sniffjoke
8.2.22 sslstrip
8.2.23 tcpreplay
8.2.24 wifi-honey
8.2.25 yersinia
8.3 VoIP Tools
8.3.1
8.3.2
8.3.3
8.3.4
8.3.5
8.3.6
8.3.7
8.3.8
8.3.9
8.3.10
8.3.11
8.3.12
iaxflood
inviteflood
ohrwurm
protos-sip
rtpbreak
rtpflood
rtpinsertsound
rtpmixsound
sctpscan
siparmyknife
sipp
sipsak
8.3.13
8.3.14
8.3.15
8.3.16
8.3.17
8.3.18
svcrack
svcrash
svmap
svreport
svwar
voiphopper
8.4 Voice and Surveillance
8.4.1 msgsnarf
8.5 Web Sniffers
8.5.1
8.5.2
8.5.3
8.5.4
8.5.5
8.5.6
8.5.7
8.5.8
8.5.9
8.5.10
9. Maintaining Access
9.1 OS Backdoors
9.1.1
9.1.2
9.1.3
9.1.4
9.1.5
9.1.6
burpsuite
dnsspoof
driftnet
ferret
mitmproxy
urlsnarf
webmitm
webscarab
webspy
zaproxy
cymothoa
dbd
intersect
powersploit
sbd
u3-pwn
9.2 Tunneling Tools
9.2.1 cryptcat
9.2.2 dbd
9.2.3 dns2tcpc
9.2.4 dns2tcpd
9.2.5
9.2.6
9.2.7
9.2.8
9.2.9
9.2.10
9.2.11
9.2.12
9.2.13
9.2.14
9.2.15
9.2.16
iodine
miredo
ncat
proxychains
proxytunnel
ptunnel
pwnat
sbd
socat
sslh
stunnel4
udptunnel
9.3 Web Backdoors
9.3.1 webacoo
9.3.2 weevely
10. Reverse Engineering
10.1 Debuggers
10.1.1 edb-debugger
10.1.2 ollydbg
10.2
Disassembly
10.2.1 jad
10.2.2 rabin2
10.2.3 radiff2
10.2.4 rasm2
10.3
Misc RE Tools
10.3.1 apktool
10.3.2 clang
10.3.3 clang++
10.3.4 dex2jar
10.3.5 flasm
10.3.6 javasnoop
10.3.7 radare2
10.3.8 rafind2
10.3.9 ragg2
10.3.10 ragg2-cc
10.3.11 rahash2
10.3.12 rarun2
10.3.13 rax2
11. Stress Testing
11.1 Network Stress testing
11.1.1 denial6
11.1.2 dhcpig
11.1.3 dos-new-ip6
11.1.4 flood_advertise6
11.1.5 flood_dhcpc6
11.1.6 flood_mld26
11.1.7 flood_mld6
11.1.8 flood_mldrouter6
11.1.9 flood_router26
11.1.10 flood_router6
11.1.11 flood_solicitate6
11.1.12 fragmentation6
11.1.13 inundator
11.1.14 kill_router6
11.1.15 macof
11.1.16 rsmurf6
11.1.17 siege
11.1.18 smurf6
11.1.19 t50
11.2
VoIP Stress testing
11.2.1 iaxflood
11.2.2 inviteflood
11.3
Web Stress Testing
11.3.1 thc-ssl-dos
11.4
Wlan Stress Testing
11.4.1 mdk3
11.4.2 reaver
12. Hardware Hacking
12.1 Android Tools
12.1.1 android-sdk
12.1.2 apktool
12.1.3 baksmali
12.1.4 dex2jar
12.1.5 smali
12.2
13. Forensics
13.1
Ardunio Tools
12.2.1 ardunio
Anti-virus Forensics Tools
13.1.1 chkrootkit
13.2
Digital Anti_Forensics
13.2.1 Chkrootkit
13.3
Digital Forensics
13.3.1 autopsy
13.3.2 binwalk
13.3.3 bulk_extractor
13.3.4 chkrootkit
13.3.5 dc3dd
13.3.6 dcfldd
13.3.7 extundelete
13.3.8 foremost
13.3.9 fsstat
13.3.10 galleta
13.3.11 tsk_comparedir
13.3.12 tsk_loaddb
13.4
Forensic Analysis Tools
13.4.1 affcompare
13.4.2 affcopy
13.4.3 affcrypto
13.4.4 affdiskprint
13.4.5 affinfo
13.4.6 affsign
13.4.7 affstats
13.4.8 affuse
13.4.9 affverify
13.4.10 affxml
13.4.11 autopsy
13.4.12 binwalk
13.4.13 blkcalc
13.4.14 blkcat
13.4.15 blkstat
13.4.16 bulk_extractor
13.4.17 ffind
13.4.18 fls
13.4.19 foremost
13.4.20 galleta
13.4.21 hfind
13.4.22 icat-sleuthkit
13.4.23 ifind
13.4.24 ils-sleuthkit
13.4.25 istat
13.4.26 jcat
13.4.27 mactime-sleuthkit
13.4.28 missidentify
13.4.29 mmcat
13.4.30 pdgmail
13.4.31 readpst
13.4.32 reglookup
13.4.33 sigfind
13.4.34 sorter
13.4.35 srch_strings
13.4.36 tsk_recover
13.4.37 vinetto
13.5
Forensic Carving Tools
13.5.1 binwalk
13.5.2 bulk_extractor
13.5.3 foremost
13.5.4 jls
13.5.5 magicrescue
13.5.6 pasco
13.5.7 pev
13.5.8 recoverjpeg
13.5.9 rifiuti
13.5.10 rifiuti2
13.5.11 safecopy
13.5.12 scalpel
13.5.13 scrounge-ntfs
13.6
Forensic Hashing Tools
13.6.1 md5deep
13.6.2 rahash2
13.7
Forensic Imaging Tools
13.7.1 affcat
13.7.2 affconvert
13.7.3 blkls
13.7.4 dc3dd
13.7.5 dcfldd
13.7.6 ddrescue
13.7.7 ewfacquire
13.7.8 ewfacquirestream
13.7.9 ewfexport
13.7.10 ewfinfo
13.7.11 ewfverify
13.7.12 fsstat
13.7.13 guymager
13.7.14 img_cat
13.7.15 img_stat
13.7.16 mmls
13.7.17 mmstat
13.7.18 tsk_gettimes
13.8
Forensic Suites
13.8.1 autopsy
13.8.2 dff
13.9
Network Forensics
13.9.1 p0f
13.10 Password Forensics Tools
13.10.1 chntpw
13.11 PDF Forensics Tools
13.11.1 pdf-parser
13.11.2 peepdf
13.12 RAM Forensics Tools
13.12.1 volafox
13.12.2 volatility
14. Reporting Tools
14.1 Documentation
14.1.1 dradis
14.1.2 keepnote
14.2
Evidence Management
14.2.1 casefile
14.2.2 magictree
14.2.3 maltego
14.2.4 metagoofil
14.2.5 pipal
14.2.6 truecrypt
14.3
Media Capture
14.3.1 cutycapt
14.3.2 recordmydesktop
15. System Services
15.1 BeEF
15.1.1 beef start
15.1.2 beef stop
15.2
Dradis
15.2.1 dradis start
15.2.2 dradis stop
15.3
HTTP
15.3.1 apache2 restart
15.3.2 apache2 start
15.3.3 apache2 stop
15.4
Metasploit
15.4.1 community / pro start
15.4.2 community / pro stop
15.5
MySQL
15.5.1 mysql restart
15.5.2 mysql start
15.5.3 mysql stop
15.6
SSH
15.6.1 sshd restart
15.6.2 sshd start
15.6.3 sshd stop