Penetration Testing Software:It provides data on the vulnerabilities in the security system and performs penetration tests. Metasploit evades leading anti-virus solutions 90% of the time and enables you to completely take over a machine you have compromised from over 200 modules. As a penetration tester, it pin points the vulnerabilities with Nexpose closed–loop integration using Top Remediation reports. Using the open source Metasploit framework, users can build their own tools and take the best out of this multi-purpose hacking tool.
2. Acunetix Web
Acunetixis a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. By using Acunetix Web Vulnerability Scanneryou can perform a full web scan from your computer in windows. This is the fast and easy which scans WordPress websites from more than 1200 vulnerabilities in WordPress.
3. Nmap (Network Mapper)
Nmap(Network Mapper) is a port scanner tool. It is used to discover hosts and services on a computer network. It is capable of Host Discovery, Port Scanning,Service Name and Version Detection, OS Detection. It is capable for tasks such as network inventory, managing service upgrade schedules, and monitoring host or serviceuptime.
You might be aware of the free passwordcracking tool Hashcat. While Hashcat is aCPU-based password cracking tool, oclHashcat is the advanced version that uses the power of your GPU. oclHashcat is the world’s fastest password cracking tool with world’s first and only GPGPU based engine.For using this tool, NVIDIA users require ForceWare 346.59 or later and AMD users require Catalyst 15.7 or later. It is released as free software and the versions available for Linux, OS X, and Windows and can come in CPU-based or GPU-based variants.
Wireshark is the world’s foremost and widely-used network protocol analyzer.Wireshark has rich features such as Deepinspection of hundreds of protocols, with more being added all the time, Multi-platform i.e; Runs on Windows, Linux, MacOS, Solaris, FreeBSD, NetBSD, and many others. It monitors every single byte of the data that is transferred via thenetwork system.
Maltego is proprietary software used for open-source intelligence and forensics, developed by Paterva. It focuses on providing a library of transforms for the discovery of data from open sources and visualizing that information in a graph format, suitable for link analysis and data mining.It is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning.
7. Social-Engineer Toolkit
It is an advanced framework for simulating multiple types of social engineering attacks like credential harvestings, phishing attacks, and more.It automates the attacks and generates disguising emails, malicious web pages and more.
8. Nessus Vulnerability Scanner
Nessus is a proprietary comprehensive vulnerability scanner which is developed by Tenable Network Security.It is free of charge for personal use in a non-enterprise environment. Nessus allows scans for. Vulnerabilities that allow a remote hacker to control or access sensitive data on a system. Misconfiguration (e.g. open mail relay, missing patches, etc.). Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack. Denials of service against the TCP/IP stack by using malformed packets. Preparation for PCI DSS auditsMost of the worlds are using Nessus to audit business-critical enterprise devices and applications.
9. Nessus Remote Security Scanner
It was an open source but recently it has been changed to closed source. It is the mostly used Security Scanner over 75,000 organizations worldwide.Most of the worlds are using Nessus to audit business-critical enterprise devices and applications.
Kismet differs from other wireless network detectors in working passively. Namely, without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients and to associate them with each other.It is also the most widely used and up to date open source wireless monitoring tool. also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks.