1. Nmap
  2. Metasploit
  3. Wireshark
  4. Kali Linux
  5. John the Ripper
  6. Nikto
  7. Burp Suite
  8. Tor
  9. Tcpdump
  10. Aircrack-ng
  11. Splunk
  12. Acunetix
  13. Snort
  14. Mimecast
  15. Malwarebytes
  16. OpenVAS
  17. SecPod SanerNow
  18. UnderDefense
  19. Intruder
  20. ManageEngine Vulnerability Manager Plus
  21. ManageEngine Log360
  22. SolarWinds Security Event Manager
  23. Norton Security
  24. McAfee
  25. AVG
  26. System Mechanic Ultimate Defense
  27. Vipre
  28. LifeLock
  29. Bitdefender Total Security
  30. NordLayer
  31. Perimeter 81
  32. CIS
  33. Webroot
  34. GnuPG
  35. Sparta Antivirus
0 sats \ 0 replies \ @ek 5 Apr
Is this your personal list? And is it in a specific order?
If so: curious why Wireshark is above tcpdump. Because it's more common to download a network capture file and analyze it locally with Wireshark? These files are created with tcpdump inside the breached network though, no?
Regarding tools I was looking for on this list: I only did pentesting in a lab but gobuster and LinPEAS were very helpful for each challenge so if I would create such a list, I would include them.
Since I don't know most of these tools in this list, which of them are for enumeration? Maybe you simply use other tools for the same purpose which are on this list.
reply