Sign in to follow this  
mesvak

HACKING TOOLS AND THINGS YOU SHOULD NO

Recommended Posts

[hide]

 

1.Tamper Data

2.Hack Bar

3.Live HTTP headers

4.User-Agent Switcher

5.Flagfox

6.Domain Details

7.Cookie Manager+

8.HttpFox

9.XSS Me

10.Fireforce

11.Wappalyzer

12.PassiveRecon

13.Blur

14.Poster

15.NoScript

16.CSRF Finder

17.Copy As Plain Text

18.FoxyProxy Standard

19.RightClickXSS

20.Export/import cookies

21.Firebug

22.CryptoFox

23.NoRedirect

24.Ghostery

25.Privacy Badger

26.Disconnect

27.Adblock Plus

28.Hoxx VPN

29.buffer overflows

 

*#Maps*

 

1.Network Plus

2.CEH

3.Linux Commands

4.Cmd Commands

5.Kali Linux Tools

6.Windows Tools

7.Learning Bugs

8.Learning Python

9.Learning Ruby

 

*#Tools*

 

1.DDoS

2.Forensics

3.Programming

4.Exploitation

5.Phone Hacking

6.Server Hacking

7.Client Hacking

8.Website Hacking

9.Network Hacking

10.Wireless Hacking

11.Reverse Engeenering

12.Information Gathering

 

*#DDoS*

 

1.MDK3

2.LOIC

3.HULK

4.DDOSIM

5.Ufonet

6.Hping3

7.Xerxes

8.Hammer

9.Slowloris

10.Websploit

11.GoldenEye

12.Metasploit

13.Aireplay-ng

14.Slowhttptest

15.CMD?

 

*#Forensics*

 

1.COFEE

2.Volafox

3.Autopsy

4.Foremost

5.Hashdeep

6.Binwalk

 

*#Programming*

 

1.Notepad++

2.Visual Studio

3.Text Editor

Many more......

 

*#Exploitation*

 

1.Metasploit

2.Sqlmap

3.Core Imact

4.W3af

5.BeEF

6.Dradis

 

*#Phone Hacking*

 

1.Metasploit

2.Apktool

3.Droidjack

4.RATs

5.Spywere

6.Backdoor playlode

 

*#Server Hacking*

 

1.SQLmap

2.Jsql

3.Havij

4.Hydra

5.Metasploit

6.Armitage

7.Brupsuite

8.Owasp-ZAP

9.Netsparker

10.Acunetix

11.OpenVAS

 

*#Client Hacking*

 

1.Darkcomet

2.FatRat

3.Veil-Evasion

4.Shallter

5.Unicorn

6.Setoolkit

7.Armitage

8.BeEF-Framework

9.EmPyre

10.FakeImageExploiter

11.Pupy

12.DFU-Programmer

13.Cobalt Strike

14.Exploitpack

15.Gcat

16.Crowbar

 

*#Website Hacking*

 

1.Sniper

2.Owasp-ZAP

3.Brupsuite

4.Netsparker

5.Acunetix

6.SQLmap

7.Xsser

8.WPScan

9.Joomrra

10.Joomscan

11.WPSeku

12.XSStrike

13.Kadimus

14.jexboss

15.CMSmap

16.brut3k1t

17.0d1n

18.CloudFail

19.Arachni

20.Nikto

21.Webscarab

22.Nmap

23.Vbscan

24.Sentry MBA

 

*#Network Hacking*

 

1.MITMf

2.Bettercap

3.Ettercap

4.Tcpdump

5.Wireshark

6.Driftnet

7.SSLstrip

8.Armitage

9.Metasploit

10.Xerosploit

11.Sparta

12.Hydra

13.some scripts

14Nmap

 

*#Wireless Hacking*

 

1.Wifite

2.Airodump-ng

3.Aireplay-ng

4.Wash

5.WiFi Pumpkin

6.Wifiphisher

7.Fluxion

8.Infernal Twin

9.WPSpin

 

*#Reverse Engeenering*

 

1.OWASP-ZSC

2.OllyDBG

3.Apktool

 

*#Methods*

 

1.DDoS

2.Forensics

3.Programming

4.Exploitation

5.Phone Hacking

6.Server Hacking

7.Client Hacking

8.Website Hacking

9.Network Hacking

10.Wireless Hacking

11.Reverse Engeenering

12.Information Gathering

 

*#DDoS*

 

1.Nuke

2.Botnet

3.Zero Day

4.Slowloris

5.SYN Flood

6.Reflected

7.Multi Vector

8.Peer to Peer

9.Ping of Death

10.Protocol Flood

11.Application Level

 

*#Forensics*

 

1.History

2.Etymology

3.Maturation

4.Toxicology

5.References

6.Bibliography

7.Fingerprints

8.Anthropometry

 

*#Programming*

 

1.C

2.PHP

3.ASP

4.Ruby

5.Bash

6.Perl

7.Python

8.Assembly

9.JavaScript

And many more,.......

 

*#Exploitation*

 

1.RCE

2.BOF

3.POC

4.SQL Injection

5.Code Execution

6.Command Injection

7.Abritrary Library

 

*#Phone Hacking*

 

1.BOF

2.RCE

3.DOS

4.Bind RAT

5.spywere

 

*#Server Hacking*

 

1.BOF

2.RCE

3.SSRF

4.Zero Day

5.Privilage

6.Bruteforce

7.Upload Shell

8.SQL Injection

 

*#Client Hacking*

 

1.RAT

2.BOF

3.RCE

4.Virus

5.Binder

6.Cryption

7.Phishing

8.Backdoor

9.Keylogger

10.Privilage

11.Bruteforce

12.Steal Passwords

13.Social Engeenering

 

*#Website Hacking*

 

1.DOS

2.XSS

3.RCE

4.XXE

5.CSRF

6.SSRF

7.LFI/RFI

8.Cracking

9.Bruteforce

10.Upload Shell

11.SQL Injection

12.Google Hacking

13.Xpath Injection

14.BoF

 

*#Network Hacking*

 

1.BOF

2.RCE

3.VoIP

4.MITM

5.Spoof

6.Sniff

7.Bruteforce

8.Cupture Packet

 

 

*#Wireless Hacking*

 

1.WPSpin

2.FakeAP

3.Eviltwin

4.Handshake

5.mitm

6.evilgnix

 

*#Reverse Engeenering*

 

1.Compiler

2.Shellcode

3.App Cracking

4.Serial Cracking

5.Decompile Softwares

 

*#Information Gathering*

 

1.Enum

2.Recon

3.Whois

4.Email Contact

5.Phone Contact

6.Service Status

7.Protocol Analysis

8.doxerv2.0

source--one_website

 

 

 

[/hide]

Share this post


Link to post
Share on other sites

This looks really interesting and i'd probably use some, if not alot. But you should really add a description for each, even if just a few words and also links? Otherwise nice OP.

Share this post


Link to post
Share on other sites

thanks I NO everything now <3

Share this post


Link to post
Share on other sites

interesting list, never heard of most of the stuff lol

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this