- Nmap
- Metasploit
- Wireshark
- Kali Linux
- John the Ripper
- Nikto
- Burp Suite
- Tor
- Tcpdump
- Aircrack-ng
- Splunk
- Acunetix
- Snort
- Mimecast
- Malwarebytes
- OpenVAS
- SecPod SanerNow
- UnderDefense
- Intruder
- ManageEngine Vulnerability Manager Plus
- ManageEngine Log360
- SolarWinds Security Event Manager
- Norton Security
- McAfee
- AVG
- System Mechanic Ultimate Defense
- Vipre
- LifeLock
- Bitdefender Total Security
- NordLayer
- Perimeter 81
- CIS
- Webroot
- GnuPG
- Sparta Antivirus
pull down to refresh
related posts
Is this your personal list? And is it in a specific order?
If so: curious why Wireshark is above tcpdump. Because it's more common to download a network capture file and analyze it locally with Wireshark? These files are created with tcpdump inside the breached network though, no?
Regarding tools I was looking for on this list: I only did pentesting in a lab but
gobusterand LinPEAS were very helpful for each challenge so if I would create such a list, I would include them.Since I don't know most of these tools in this list, which of them are for enumeration? Maybe you simply use other tools for the same purpose which are on this list.