0% found this document useful (0 votes)
291 views22 pages

Kali Linux Kate Gori

This document provides an overview of security tools available in Kali Linux organized into categories including information gathering, vulnerability analysis, web applications, password attacks, wireless attacks, and exploitation tools. It lists numerous scanning, auditing, fuzzing, cracking, and penetration testing tools and their uses for tasks such as reconnaissance, vulnerability identification, exploitation, and post-exploitation.

Uploaded by

Rashad85
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
291 views22 pages

Kali Linux Kate Gori

This document provides an overview of security tools available in Kali Linux organized into categories including information gathering, vulnerability analysis, web applications, password attacks, wireless attacks, and exploitation tools. It lists numerous scanning, auditing, fuzzing, cracking, and penetration testing tools and their uses for tasks such as reconnaissance, vulnerability identification, exploitation, and post-exploitation.

Uploaded by

Rashad85
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Kali Linux

1. Top 10Security Tools:


1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

2. Information Gathering
2.1 DNS Analysis
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.7
2.1.8
2.1.9
2.1.10
2.1.11
2.1.12

Aircrack-ng
Burpsuite
Hydra
Jonh
Maltego
Metasploit framework
Nmap
sqlmap
Wireshark
Zaproxy

dnsdict6
dnsenum
dnsmap
dnsrecon
dnsrevenum6
dnstracer
dnswalk
fierce
maltego
nmap
urlcrazy
zenmap

2.2 IDS/IPS Identification


2.2.1 fragroute
2.2.2 fragrouter
2.2.3 ftest
2.2.4 lbd
2.2.5 wafw00f

2.3 Live Host Identification


2.3.1 alive6

2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.3.9
2.3.10
2.3.11
2.3.12
2.3.13
2.3.14
2.3.15
2.3.16
2.3.17
2.3.18
2.3.19
2.3.20

arping
cdpsnarf
dedect-new-ip6
dedect_sniffer6
dmitry
dnmap-client
dnmap-server
fping
hping3
inverse_lookup6
miranda
ncat
netdiscover
nmap
passive_discovery6
thcping6
wol-e
xprobe2
zenmap

2.4 Network Scanners


2.4.1 dmitry
2.4.2 dnmap-client
2.4.3 dnmap-server
2.4.4 netdiscover
2.4.5 nmap
2.4.6 zenmap

2.5 OS Fingerprinting
2.5.1 dnmap-client
2.5.2 dnmap-server
2.5.3 miranda
2.5.4 nmap
2.5.5 zenmap

2.6 OSINT Analysis


2.6.1 casefile

2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.6.7
2.6.8
2.6.9

2.7 Route Analysis


2.7.1
2.7.2
2.7.3
2.7.4
2.7.5
2.7.6

creepy
dmitry
jigsaw
maltego
metagoofil
theharvester
twofi
urlcrazy

0trace
dnmap-client
dnmap-server
intrace
netmask
trace6

2.8 Service Fingerprinting


2.8.1 dnmap-client
2.8.2 dnmap-server
2.8.3 implementation6
2.8.4 implemantation6d
2.8.5 ncat
2.8.6 nmap
2.8.7 sslscan
2.8.8 sslyze
2.8.9 tlssled
2.8.10 zenmap

2.9 SMB Analysis


2.9.1
2.9.2
2.9.3
2.9.4

acccheck
nbtscan
nmap
zenmap

2.10

SMTP Analysis
2.10.1 nmap
2.10.2 smtp-user-enum
2.10.3 swaks
2.10.4 zenmap

2.11

SNMP Analysis
2.11.1 braa
2.11.2 cisco-auditing-tool
2.11.3 cisco-torch
2.11.4 copy-router-config
2.11.5 merge-router-config
2.11.6 nmap
2.11.7 onesixtyone
2.11.8 snmpcheck
2.11.9 zenmap

2.12

SSL Analysis
2.12.1 sslcaudit
2.12.2 ssldump
2.12.3 sslh
2.12.4 sslscan
2.12.5 sslsniff
2.12.6 sslstrip
2.12.7 sslyze
2.12.8 stunnel4
2.12.9 tlssled

2.13

Telephony Analysis
2.13.1 ace

2.14

Traffic Analysis
2.14.1 0trace
2.14.2 Cdpsnarf
2.14.3 Ftest
2.14.4 Intrace

2.14.5
2.14.6
2.14.7
2.14.8

irpas-ass
irpass-cdp
p0ftcplow
wireshark

2.15

VoIP Analysis
2.15.1 ace
2.15.2 enumiax

2.16

VPN Analysis
2.16.1 ike-scan

3. Vulnerability Analysis
3.1 Cisco Tools
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5

cisco-auditing-tool
cisco-global-exploiter
cisco-ocs
cisco-torch
yersinia

3.2 Databse Assessment


3.2.1 bbqsql
3.2.2 dbpwaudit
3.2.3 hexorbase
3.2.4 mdb-export
3.2.5 mdb-hexdump
3.2.6 mdb-parsecsv
3.2.7 mdb-sql
3.2.8 mdb-tables
3.2.9 oscanner
3.2.10 sidguesser
3.2.11 sqldict
3.2.12 sqlmap
3.2.13 sqlninja
3.2.14 sqlsus
3.2.15 tnscmd10g

3.3 Fuzzing Tools


3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8
3.3.9
3.3.10

bed
fuzz_ip6
ohrwurm
powerfuzzer
sfuzz
siparmyknife
spike-generic_chunked
spike_generic_listen_tcp
spike_generic_send_tcp
spike_generic_send_udp

3.4 Misc Scanners


3.4.1
3.4.2
3.4.3
3.4.4
3.4.5

lynis
nikto
nmap
unix-privesc-check
zenmap

3.5 Open Source Assessment


3.5.1 casefile
3.5.2 maltego

3.6 OpenVAS
3.6.1
3.6.2

openvas-gsd
openvas-setup

4. Web Applications
4.1 CMS Identification
4.1.1 blindelephant
4.1.2 plecost
4.1.3 wpscan

4.2 Database exploitation


4.2.1 bbqsql
4.2.2 sqlninja
4.2.3 sqlsus

4.3 IDS/IPS Identification


4.3.1 ua-tester

4.4 Web Application Fuzzers


4.4.1 burpsuite
4.4.2 powerfuzzer
4.4.3 webscarab
4.4.4 webslayer
4.4.5 websploit
4.4.6 wfuzz
4.4.7 xsser
4.4.8 zaproxy

4.5 Web Application Proxies


4.5.1 burpsuite
4.5.2 paros
4.5.3 proxystrike
4.5.4 vega
4.5.5 webscarab
4.5.6 zaproxy

4.6 Web Crawlers


4.6.1
4.6.2
4.6.3
4.6.4
4.6.5
4.6.6
4.6.7
4.6.8
4.6.9

apache-users
burpsuite
cutycapt
dirb
dirbuster
vega
webscarab
webslayer
zaproxy

4.7 Web Vulnerability Scanners


4.7.1 arachni_web
4.7.2 burpsuite
4.7.3 cadaver
4.7.4 davtest
4.7.5 deblze
4.7.6 fimap
4.7.7 grabber
4.7.8 joomscan
4.7.9 nikto
4.7.10 padbuster
4.7.11 proxystrike
4.7.12 skipfish
4.7.13 sqlmap
4.7.14 uniscan-gui
4.7.15 vega
4.7.16 w3af
4.7.17 wapiti
4.7.18 webscarab
4.7.19 webshag-gui
4.7.20 websploit
4.7.21 whatweb
4.7.22 wpscan
4.7.23 xsser
4.7.24 zaproxy

5. Password Attacks
5.1 GPU Tools
5.1.1
5.1.2
5.1.3

oclhashcat-lite
oslhashcat-plus
pyrit

5.2 Offline Attacks


5.2.1 cachedump
5.2.2 chntpw
5.2.3 cmospwd

5.2.4
5.2.5
5.2.6
5.2.7
5.2.8
5.2.9
5.2.10
5.2.11
5.2.12
5.2.13
5.2.14
5.2.15
5.2.16
5.2.17
5.2.18
5.2.19
5.2.20
5.2.21
5.2.22
5.2.23
5.2.24
5.2.25
5.2.26
5.2.27

5.3 Online Attacks


5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
5.3.6
5.3.7
5.3.8
5.3.9
5.3.10
5.3.11
5.3.12
5.3.13
5.3.14

crunch
dictstat
fcrackzip
hashcat
hash-identifier
john
johnny
lsadump
maskgen
multiforcer
oclhashcat-lite
oclhashcat-plus
ophcrack
ophcrack-cli
policygen
pwdump
pyrit
rainbowcrack
rcracki_mt
rsmangler
samdump2
sipcrack
sucrack
truecrack

acccheck
burpuite
cewl
cisco-auditing-tool
dbpwaudit
findmyhash
hydra
hydra-gtk
keimpx
medusa
ncrack
onesixtyone
patator
phrasendrescher

5.3.15 thc-pptp-bruter
5.3.16 webscarab
5.3.17 zaproxy

6. Wireless Attacks
6.1 Bluetooth Tools
6.1.1 bluelog
6.1.2 bluemaho
6.1.3 blueranger
6.1.4 btscanner
6.1.5 fang
6.1.6 fang
6.1.7 spooftooph

6.2 Other Wireless Tools


6.2.1 zbassocflood
6.2.2 zbconvert
6.2.3 zbdsniff
6.2.4 zbdump
6.2.5 zbfind
6.2.6 zbgoodfind
6.2.7 zbreplay
6.2.8 zbstumbler

6.3 RFID/NFC Tools


6.3.1 NFC Tools
6.3.1.1
6.3.1.2
6.3.1.3
6.3.1.4
6.3.1.5

6.3.2

mfcuk
mfoc
mifare-classic-format
nfc-list
nfc-mfclassic

RFIDiot ACG
6.3.2.1 brute force hitag2
6.3.2.2 bruteforce mifare
6.3.2.3 calculate jcop mifare keys

6.3.2.4 continuous select tag


6.3.2.5 copy iso15693 tag
6.3.2.6 epassport read write clone
6.3.2.7 format mifare 1k value blocks
6.3.2.8 identify hf tag type
6.3.2.9
identify lf tag type
6.3.2.10
jcop info
6.3.2.11
jcop mifare read write
6.3.2.12
jcop set atr historical bytes
6.3.2.13
read acg reader eeprom
6.3.2.14
read lf tag
6.3.2.15
read mifare
6.3.2.16
read tag
6.3.2.17
read write clone unique(em4x02)
6.3.2.18
reset q5 tag
6.3.2.19
select tag
6.3.2.20
set fdx-b id
6.3.2.21
test acg lahf

6.3.3

RFIDiot FROSCH
6.3.3.1 read write clone unique (em4x02)
6.3.3.2 reset hitag2 tag
6.3.3.3 set fdx-b id
6.3.3.4 test frosch reader

6.3.4

RFIDiot PCSC
6.3.4.1
6.3.4.2
6.3.4.3
6.3.4.4
6.3.4.5
6.3.4.6
6.3.4.7
6.3.4.8
6.3.4.9
6.3.4.10
6.3.4.11
6.3.4.12

bruteforce mifare
calculate jcop mifare keys
chip&pin info
continuous select tag
epassport read/write/clone
identify hf tag type
jcop info
jcop mifare read/write
jcop set atr historical bytes
Read mifare
Read tag
Select tag

6.4 Wireless
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.4.6
6.4.7
6.4.8
6.4.9
6.4.10
6.4.11
6.4.12
6.4.13
6.4.14
6.4.15
6.4.16
6.4.17

aircrack-ng
asleap
bully
cowpatty
eapmd5pass
fern-wifi-cracker
genkeys
genpmk
giskismet
kismet
mdk3
wifiarp
wifidns
wifi-honey
wifiping
wifitap
wifite

7. Exploitation Tools
7.1 BeEF XSS Framework
7.1.1 beef
7.2 Cisco Attacks
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5

cisco-auditing-tool
cisco-global-exploitler
cisco-ocs
cisco-torch
yersinia

7.3 Exploit Database


7.3.1 searchsploit

7.4 Metasploit
7.4.1
7.4.2
7.4.3

metasploit community/pro
metasploit diagnostic logs
metasploit diagnostic shell

7.4.4
7.4.5

metasploit framework
update metasploit

7.5 Network Exploitation


7.5.1 armitage
7.5.2 exploit6
7.5.3 ikat
7.5.4 jboss-autopwn-linux
7.5.5 jboss-autopwn-win
7.5.6 termineter

7.6 Social Engineering Toolkit


7.6.1 se-toolkit

8. Sniffing/Spoofing
8.1 Network Sniffers
8.1.1 darkstat
8.1.2 dnschef
8.1.3 dnsspoof
8.1.4 dsniff
8.1.5 ettercap-graphical
8.1.6 hexinject
8.1.7 mailsnarf
8.1.8 msgsnarf
8.1.9 netsniff-ng
8.1.10 passive_discovery6
8.1.11 responder
8.1.12 sslsniff
8.1.13 tcpflow
8.1.14 urlsnarf
8.1.15 webmitm
8.1.16 webspy
8.1.17 wieshark

8.2 Network Spoofing


8.2.1 dnschef
8.2.2 ettercap-graphical
8.2.3 evilgrade
8.2.4 fake_advertise6
8.2.5 fake_dhcps6
8.2.6 fake_dns6d
8.2.7 fake_dnsupdate6
8.2.8 fake_mipv6
8.2.9 fake_mld26
8.2.10 fake_mld6
8.2.11 fake_mldrouter6
8.2.12 fake_router6
8.2.13 fake_solicitate6
8.2.14 fiked
8.2.15 macchanger
8.2.16 parasite6
8.2.17 randicmp6
8.2.18 rebind
8.2.19 redir6
8.2.20 responder
8.2.21 sniffjoke
8.2.22 sslstrip
8.2.23 tcpreplay
8.2.24 wifi-honey
8.2.25 yersinia

8.3 VoIP Tools


8.3.1
8.3.2
8.3.3
8.3.4
8.3.5
8.3.6
8.3.7
8.3.8
8.3.9
8.3.10
8.3.11
8.3.12

iaxflood
inviteflood
ohrwurm
protos-sip
rtpbreak
rtpflood
rtpinsertsound
rtpmixsound
sctpscan
siparmyknife
sipp
sipsak

8.3.13
8.3.14
8.3.15
8.3.16
8.3.17
8.3.18

svcrack
svcrash
svmap
svreport
svwar
voiphopper

8.4 Voice and Surveillance


8.4.1 msgsnarf

8.5 Web Sniffers


8.5.1
8.5.2
8.5.3
8.5.4
8.5.5
8.5.6
8.5.7
8.5.8
8.5.9
8.5.10

9. Maintaining Access
9.1 OS Backdoors
9.1.1
9.1.2
9.1.3
9.1.4
9.1.5
9.1.6

burpsuite
dnsspoof
driftnet
ferret
mitmproxy
urlsnarf
webmitm
webscarab
webspy
zaproxy

cymothoa
dbd
intersect
powersploit
sbd
u3-pwn

9.2 Tunneling Tools


9.2.1 cryptcat
9.2.2 dbd
9.2.3 dns2tcpc
9.2.4 dns2tcpd

9.2.5
9.2.6
9.2.7
9.2.8
9.2.9
9.2.10
9.2.11
9.2.12
9.2.13
9.2.14
9.2.15
9.2.16

iodine
miredo
ncat
proxychains
proxytunnel
ptunnel
pwnat
sbd
socat
sslh
stunnel4
udptunnel

9.3 Web Backdoors


9.3.1 webacoo
9.3.2 weevely

10. Reverse Engineering


10.1 Debuggers
10.1.1 edb-debugger
10.1.2 ollydbg

10.2

Disassembly
10.2.1 jad
10.2.2 rabin2
10.2.3 radiff2
10.2.4 rasm2

10.3

Misc RE Tools
10.3.1 apktool
10.3.2 clang
10.3.3 clang++
10.3.4 dex2jar
10.3.5 flasm
10.3.6 javasnoop
10.3.7 radare2

10.3.8 rafind2
10.3.9 ragg2
10.3.10 ragg2-cc
10.3.11 rahash2
10.3.12 rarun2
10.3.13 rax2

11. Stress Testing


11.1 Network Stress testing
11.1.1 denial6
11.1.2 dhcpig
11.1.3 dos-new-ip6
11.1.4 flood_advertise6
11.1.5 flood_dhcpc6
11.1.6 flood_mld26
11.1.7 flood_mld6
11.1.8 flood_mldrouter6
11.1.9 flood_router26
11.1.10 flood_router6
11.1.11 flood_solicitate6
11.1.12 fragmentation6
11.1.13 inundator
11.1.14 kill_router6
11.1.15 macof
11.1.16 rsmurf6
11.1.17 siege
11.1.18 smurf6
11.1.19 t50

11.2

VoIP Stress testing


11.2.1 iaxflood
11.2.2 inviteflood

11.3

Web Stress Testing


11.3.1 thc-ssl-dos

11.4

Wlan Stress Testing


11.4.1 mdk3
11.4.2 reaver

12. Hardware Hacking


12.1 Android Tools
12.1.1 android-sdk
12.1.2 apktool
12.1.3 baksmali
12.1.4 dex2jar
12.1.5 smali

12.2

13. Forensics
13.1

Ardunio Tools
12.2.1 ardunio

Anti-virus Forensics Tools


13.1.1 chkrootkit

13.2

Digital Anti_Forensics
13.2.1 Chkrootkit

13.3

Digital Forensics
13.3.1 autopsy
13.3.2 binwalk
13.3.3 bulk_extractor
13.3.4 chkrootkit
13.3.5 dc3dd
13.3.6 dcfldd
13.3.7 extundelete
13.3.8 foremost
13.3.9 fsstat
13.3.10 galleta
13.3.11 tsk_comparedir
13.3.12 tsk_loaddb

13.4

Forensic Analysis Tools


13.4.1 affcompare
13.4.2 affcopy
13.4.3 affcrypto
13.4.4 affdiskprint
13.4.5 affinfo
13.4.6 affsign
13.4.7 affstats
13.4.8 affuse
13.4.9 affverify
13.4.10 affxml
13.4.11 autopsy
13.4.12 binwalk
13.4.13 blkcalc
13.4.14 blkcat
13.4.15 blkstat
13.4.16 bulk_extractor
13.4.17 ffind
13.4.18 fls
13.4.19 foremost
13.4.20 galleta
13.4.21 hfind
13.4.22 icat-sleuthkit
13.4.23 ifind
13.4.24 ils-sleuthkit
13.4.25 istat
13.4.26 jcat
13.4.27 mactime-sleuthkit
13.4.28 missidentify
13.4.29 mmcat
13.4.30 pdgmail
13.4.31 readpst
13.4.32 reglookup
13.4.33 sigfind
13.4.34 sorter
13.4.35 srch_strings
13.4.36 tsk_recover
13.4.37 vinetto

13.5

Forensic Carving Tools


13.5.1 binwalk
13.5.2 bulk_extractor
13.5.3 foremost
13.5.4 jls
13.5.5 magicrescue
13.5.6 pasco
13.5.7 pev
13.5.8 recoverjpeg
13.5.9 rifiuti
13.5.10 rifiuti2
13.5.11 safecopy
13.5.12 scalpel
13.5.13 scrounge-ntfs

13.6

Forensic Hashing Tools


13.6.1 md5deep
13.6.2 rahash2

13.7

Forensic Imaging Tools


13.7.1 affcat
13.7.2 affconvert
13.7.3 blkls
13.7.4 dc3dd
13.7.5 dcfldd
13.7.6 ddrescue
13.7.7 ewfacquire
13.7.8 ewfacquirestream
13.7.9 ewfexport
13.7.10 ewfinfo
13.7.11 ewfverify
13.7.12 fsstat
13.7.13 guymager
13.7.14 img_cat
13.7.15 img_stat
13.7.16 mmls
13.7.17 mmstat
13.7.18 tsk_gettimes

13.8

Forensic Suites
13.8.1 autopsy
13.8.2 dff

13.9

Network Forensics
13.9.1 p0f

13.10 Password Forensics Tools


13.10.1 chntpw

13.11 PDF Forensics Tools


13.11.1 pdf-parser
13.11.2 peepdf

13.12 RAM Forensics Tools


13.12.1 volafox
13.12.2 volatility

14. Reporting Tools


14.1 Documentation
14.1.1 dradis
14.1.2 keepnote

14.2

Evidence Management
14.2.1 casefile
14.2.2 magictree
14.2.3 maltego
14.2.4 metagoofil
14.2.5 pipal
14.2.6 truecrypt

14.3

Media Capture
14.3.1 cutycapt
14.3.2 recordmydesktop

15. System Services


15.1 BeEF
15.1.1 beef start
15.1.2 beef stop

15.2

Dradis
15.2.1 dradis start
15.2.2 dradis stop

15.3

HTTP
15.3.1 apache2 restart
15.3.2 apache2 start
15.3.3 apache2 stop

15.4

Metasploit
15.4.1 community / pro start
15.4.2 community / pro stop

15.5

MySQL
15.5.1 mysql restart
15.5.2 mysql start
15.5.3 mysql stop

15.6

SSH
15.6.1 sshd restart
15.6.2 sshd start
15.6.3 sshd stop

You might also like