Name Tools Kali Linux

Name Tools Kali Linux


So many Linux distributions are used as a tool for Penetration Testing makes Linux users who enjoy these activities to choose which distributions are suitable for them. All Distributions Penetration Testing has advantages and disadvantages of each, so users would want a Linux Distro most advantages.

Penetration Testing of some distributions that I have ever met, the most dominant Kali Linux preferred by Linux users, since its predecessor (BackTrack) are very popular among Linuxer thus making the generation Linux also chimed popular.

One of the advantages of Kali Linux is to have a lot of Penetration Testing tool is ready for use after installation or can be directly used by the Live USB or DVD. More than 300 Penetration Testing Tool which is in Kali Linux and tools are divided into categories according to their respective functions.

To better know those tools then I made a post this so Kali Linux users know the names of Kali Linux tool, whether it is frequently used and is not often used. Here I sorted them by category Tools that I got from the official web site Kali Linux.


Information Gathering Vulnerability Analysis Wireless Attacks
acccheck BBQSQL Aircrack-ng
ace-voip BED Asleap
Amap cisco-auditing-tool Bluelog
Automater cisco-global-exploiter BlueMaho
bing-ip2hosts cisco-ocs Bluepot
braa cisco-torch BlueRanger
CaseFile copy-router-config Bluesnarfer
CDPSnarf DBPwAudit Bully
cisco-torch Doona coWPAtty
Cookie Cadger DotDotPwn crackle
copy-router-config Greenbone Security Assistant eapmd5pass
DMitry GSD Fern Wifi Cracker
dnmap HexorBase Ghost Phisher
dnsenum Inguma GISKismet
dnsmap jSQL Gqrx
DNSRecon Lynis gr-scan
dnstracer Nmap hostapd-wpe
dnswalk ohrwurm kalibrate-rtl
DotDotPwn openvas-administrator KillerBee
enum4linux openvas-cli Kismet
enumIAX openvas-manager mdk3
Fierce openvas-scanner mfcuk
Firewalk Oscanner mfoc
fragroute Powerfuzzer mfterm
fragrouter sfuzz Multimon-NG
Ghost Phisher SidGuesser PixieWPS
GoLismero SIPArmyKnife Reaver
goofile sqlmap redfang
hping3 Sqlninja RTLSDR Scanner
InTrace sqlsus Spooftooph
iSMTP THC-IPV6 Wifi Honey
lbd tnscmd10g Wifitap
Maltego Teeth unix-privesc-check Wifite
masscan Yersinia
Metagoofil
Miranda
Nmap
ntop
p0f
Parsero
Recon-ng
SET
smtp-user-enum
snmp-check
sslcaudit
SSLsplit
sslstrip
SSLyze
THC-IPV6
theHarvester
TLSSLed
twofi
URLCrazy
Wireshark
WOL-E
Xplico

Web Applications Exploitation Tools Forensics Tools
apache-users Armitage Binwalk
Arachni Backdoor Factory bulk-extractor
BBQSQL BeEF Capstone
BlindElephant cisco-auditing-tool chntpw
Burp Suite cisco-global-exploiter Cuckoo
CutyCapt cisco-ocs dc3dd
DAVTest cisco-torch ddrescue
deblaze Commix DFF
DIRB crackle diStorm3
DirBuster exploitdb Dumpzilla
fimap jboss-autopwn extundelete
FunkLoad Linux Exploit Suggester Foremost
Grabber Maltego Teeth Galleta
jboss-autopwn SET Guymager
joomscan ShellNoob iPhone Backup Analyzer
jSQL sqlmap p0f
Maltego Teeth THC-IPV6 pdf-parser
PadBuster Yersinia pdfid
Paros pdgmail
Parsero peepdf
plecost RegRipper
Powerfuzzer Volatility
ProxyStrike Xplico
Recon-ng
Skipfish
sqlmap
Sqlninja
sqlsus
ua-tester
Uniscan
Vega
w3af
WebScarab
Webshag
WebSlayer
WebSploit
Wfuzz
WPScan
XSSer
zaproxy

Stress Testing Sniffing & Spoofing Password Attacks
DHCPig Burp Suite acccheck
FunkLoad DNSChef Burp Suite
iaxflood fiked CeWL
Inundator hamster-sidejack chntpw
inviteflood HexInject cisco-auditing-tool
ipv6-toolkit iaxflood CmosPwd
mdk3 inviteflood creddump
Reaver iSMTP crunch
rtpflood isr-evilgrade DBPwAudit
SlowHTTPTest mitmproxy findmyhash
t50 ohrwurm gpp-decrypt
Termineter protos-sip hash-identifier
THC-IPV6 rebind HexorBase
THC-SSL-DOS responder THC-Hydra
rtpbreak John the Ripper
rtpinsertsound Johnny
rtpmixsound keimpx
sctpscan Maltego Teeth
SIPArmyKnife Maskprocessor
SIPp
SIPVicious multiforcer
SniffJoke Ncrack
SSLsplit oclgausscrack
sslstrip PACK
THC-IPV6 patator
VoIPHopper phrasendrescher
WebScarab polenum
Wifi Honey RainbowCrack
Wireshark rcracki-mt
xspy RSMangler
Yersinia SQLdict
zaproxy Statsprocessor
THC-pptp-bruter
TrueCrack
WebScarab
wordlists
zaproxy

Maintaining Access Reverse Engineering Hardware Hacking Reporting Tools
CryptCat apktool android-sdk CaseFile
Cymothoa dex2jar apktool CutyCapt
dbd diStorm3 Arduino dos2unix
dns2tcp edb-debugger dex2jar Dradis
http-tunnel jad Sakis3G KeepNote
HTTPTunnel javasnoop smali MagicTree
Intersect JD-GUI Metagoofil
Nishang OllyDbg Nipper-ng
polenum smali pipal
PowerSploit Valgrind
pwnat YARA
RidEnum
sbd
U3-Pwn
Webshells
Weevely
Winexe

Related Post

Belum ada Komentar untuk "Name Tools Kali Linux"

Posting Komentar

Thank you for reading the article in this post.
We hope you can leave comments about this post, so that it will be an evaluation material for us to make a better article for the future.

Report if there is an inactive link by commenting, we will immediately make improvements to the link.

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel