0% found this document useful (0 votes)
38 views9 pages

Tools

The document lists hacking skills, tools, and methods that a hacker should be familiar with. It provides over 200 tools across different categories like DDoS attacks, forensics, programming, exploitation, phone hacking, server hacking, client hacking, website hacking, network hacking, wireless hacking and reverse engineering. It also lists common hacking methods within each category like buffer overflows, remote code execution, SQL injection, and man-in-the-middle attacks.

Uploaded by

woyaf61625
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views9 pages

Tools

The document lists hacking skills, tools, and methods that a hacker should be familiar with. It provides over 200 tools across different categories like DDoS attacks, forensics, programming, exploitation, phone hacking, server hacking, client hacking, website hacking, network hacking, wireless hacking and reverse engineering. It also lists common hacking methods within each category like buffer overflows, remote code execution, SQL injection, and man-in-the-middle attacks.

Uploaded by

woyaf61625
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

 1 of 9 posts  

(/)

 Resources (/t/resources)

Hacking skills and tools you should have

 Share

xa (/u/xa)  ᴄʜɪᴇꜰ | ᴀᴅᴍɪɴɪꜱᴛʀᴀᴛᴏʀ Jul 31, 2021

1.Tamper Data
2.Hack Bar
3.Live HTTP headers
4.User-Agent Switcher
5.Flagfox
6.Domain Details
7.Cookie Manager+
8.HttpFox
9.XSS Me
10.Fireforce
11.Wappalyzer
12.PassiveRecon
13.Blur
14.Poster
15.NoScript
16.CSRF Finder
17.Copy As Plain Text
18.FoxyProxy Standard
19.RightClickXSS
20.Export/import cookies
21.Firebug
22.CryptoFox
23.NoRedirect

24.Ghostery
(/)
25.Privacy Badger
26.Disconnect
27.Adblock Plus
28.Hoxx VPN
29.buffer overflows

#Maps

1.Network Plus
2.CEH
3.Linux Commands
4.Cmd Commands
5.Kali Linux Tools
6.Windows Tools
7.Learning Bugs
8.Learning Python
9.Learning Ruby

#Tools

1.DDoS
2.Forensics
3.Programming
4.Exploitation
5.Phone Hacking
6.Server Hacking
7.Client Hacking
8.Website Hacking
9.Network Hacking
10.Wireless Hacking
11.Reverse Engeenering
12.Information Gathering

#DDoS

1.MDK3
2.LOIC
3.HULK
4.DDOSIM
5.Ufonet
6.Hping3
7.Xerxes
8.Hammer
9.Slowloris
10.Websploit

11.GoldenEye
(/)
12.Metasploit
13.Aireplay-ng
14.Slowhttptest
15.CMD?

#Forensics

1.COFEE
2.Volafox
3.Autopsy
4.Foremost
5.Hashdeep
6.Binwalk

#Programming

1.Notepad++
2.Visual Studio
3.Text Editor
Many more……

#Exploitation

1.Metasploit
2.Sqlmap
3.Core Imact
4.W3af
5.BeEF
6.Dradis

#Phone Hacking

1.Metasploit
2.Apktool
3.Droidjack
4.RATs
5.Spywere
6.Backdoor playlode

#Server Hacking

1.SQLmap
2.Jsql
3.Havij
4.Hydra
5.Metasploit
6.Armitage

7.Brupsuite
(/)
8.Owasp-ZAP
9.Netsparker
10.Acunetix
11.OpenVAS

#Client Hacking

1.Darkcomet
2.FatRat
3.Veil-Evasion
4.Shallter
5.Unicorn
6.Setoolkit
7.Armitage
8.BeEF-Framework
9.EmPyre
10.FakeImageExploiter
11.Pupy
12.DFU-Programmer
13.Cobalt Strike
14.Exploitpack
15.Gcat
16.Crowbar

#Website Hacking

1.Sniper
2.Owasp-ZAP
3.Brupsuite
4.Netsparker
5.Acunetix
6.SQLmap
7.Xsser
8.WPScan
9.Joomrra
10.Joomscan
11.WPSeku
12.XSStrike
13.Kadimus
14.jexboss
15.CMSmap
16.brut3k1t
17.0d1n
18.CloudFail

19.Arachni
(/)
20.Nikto
21.Webscarab
22.Nmap
23.Vbscan
24.Sentry MBA

#Network Hacking

1.MITMf
2.Bettercap
3.Ettercap
4.Tcpdump
5.Wireshark
6.Driftnet
7.SSLstrip
8.Armitage
9.Metasploit
10.Xerosploit
11.Sparta
12.Hydra
13.some scripts
14Nmap

#Wireless Hacking

1.Wifite
2.Airodump-ng
3.Aireplay-ng
4.Wash
5.WiFi Pumpkin
6.Wifiphisher
7.Fluxion
8.Infernal Twin
9.WPSpin

#Reverse Engeenering

1.OWASP-ZSC
2.OllyDBG
3.Apktool

#Methods
1.DDoS

2.Forensics
(/)
3.Programming
4.Exploitation
5.Phone Hacking
6.Server Hacking
7.Client Hacking
8.Website Hacking
9.Network Hacking
10.Wireless Hacking
11.Reverse Engeenering
12.Information Gathering

#DDoS

1.Nuke
2.Botnet
3.Zero Day
4.Slowloris
5.SYN Flood
6.Reflected
7.Multi Vector
8.Peer to Peer
9.Ping of Death
10.Protocol Flood
11.Application Level

#Forensics

1.History
2.Etymology
3.Maturation
4.Toxicology
5.References
6.Bibliography
7.Fingerprints
8.Anthropometry

*#Programming*

1.C
2.PHP
3.ASP
4.Ruby
5.Bash
6.Perl
7.Python

8.Assembly
(/)
9.JavaScript
And many more,…….

*#Exploitation*

1.RCE
2.BOF
3.POC
4.SQL Injection
5.Code Execution
6.Command Injection
7.Abritrary Library

*#Phone Hacking*

1.BOF
2.RCE
3.DOS
4.Bind RAT
5.spywere

*#Server Hacking*

1.BOF
2.RCE
3.SSRF
4.Zero Day
5.Privilage
6.Bruteforce
7.Upload Shell
8.SQL Injection

*#Client Hacking*

1.RAT
2.BOF
3.RCE
4.Virus
5.Binder
6.Cryption
7.Phishing
8.Backdoor
9.Keylogger
10.Privilage
11.Bruteforce

12.Steal Passwords
(/)
13.Social Engeenering

*#Website Hacking*

1.DOS
2.XSS
3.RCE
4.XXE
5.CSRF
6.SSRF
7.LFI/RFI
8.Cracking
9.Bruteforce
10.Upload Shell
11.SQL Injection
12.Google Hacking
13.Xpath Injection
14.BoF

#Network Hacking

1.BOF
2.RCE
3.VoIP
4.MITM
5.Spoof
6.Sniff
7.Bruteforce
8.Cupture Packet

#Wireless Hacking

1.WPSpin
2.FakeAP
3.Eviltwin
4.Handshake
5.mitm
6.evilgnix

#Reverse Engeenering

1.Compiler
2.Shellcode
3.App Cracking
4.Serial Cracking

5.Decompile Softwares
(/)

#Information Gathering

1.Enum
2.Recon
3.Whois
4.Email Contact
5.Phone Contact
6.Service Status
7.Protocol Analysis
8.doxerv2.0

Disclaimer
This content has been shared under Educational And Non-Profit Purposes Only.
Hacksnation.com cannot be liable for what a person decides to do with this
knowledge.

Reply

 learner (/u/learner), blacksuitboy (/u/blacksuitboy), abc123 (/u/abc123), and 5 others like this.

16 DAYS LATER

S SkyCode (/u/SkyCode) Aug 17, 2021

where can I find these tools?

You might also like