Wireshark: Sort By: Popularity

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

A hacking tool is a program designed to assist with hacking, or a piece of software which can be

used for hacking purposes.


Examples include Nmap, Nessus, John the Ripper, p0f, and Winzapper.[1] Bribes have also been
described as among the most potent hacking tools, due to their potential exploitation in social
engineering attacks.[2] Occasionally, common software such as ActiveX is exploited as a hacking
tool as well.[3][4]
Hacking tools such as Cain and Abel, however, are well known as Script Kiddie Tools. Script
kiddies are people who follow instructions from a manual, without realising how it happens.
These Script Kiddies have been an enormous threat to computer security as there are many
hacking tools and keyloggers up for download which are free.

SecTools.Org: Top 125 Network Security Tools


For more than a decade, the Nmap Project has been cataloguing the network security
community's favorite tools. In 2011 this site became much more dynamic, offering ratings,
reviews, searching, sorting, and a new tool suggestion form. This site allows open source and
commercial tools on any platform, except those tools that we maintain (such as the Nmap
Security Scanner, Ncat network connector, and Nping packet manipulator).
We're very impressed by the collective smarts of the security community and we highly
recommend reading the whole list and investigating any tools you are unfamiliar with. Click any
tool name for more details on that particular application, including the chance to read (and write)
reviews. Many site elements are explained by tool tips if you hover your mouse over them.
Enjoy!
Sort by: popularity rating release date

Tools 125 of 125 next page

(19)

Wireshark (#1, 1)

Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open
source multi-platform network protocol analyzer. It allows you to examine data from a live
network or from a capture file on disk. You can interactively browse the capture data, delving
down into just the level of packet detail you need. Wireshark has several powerful features,
including a rich display filter language and the ability to view the reconstructed stream of a TCP
session. It also supports hundreds of protocols and media types. A tcpdump-like console version
named tshark is included. One word of caution is that Wireshark has suffered from dozens of
remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or
hostile networks (such as security conferences). Read 32 reviews.
Latest release: version 1.12.7 on Aug. 12, 2015 (2 months, 3 weeks ago).

o
o

o
o
o
o
o
o
o

sniffers

(9)

Metasploit (#2, 3)

Metasploit took the security world by storm when it was released in 2004. It is an advanced
open-source platform for developing, testing, and using exploit code. The extensible model
through which payloads, encoders, no-op generators, and exploits can be integrated has made it
possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It

ships with hundreds of exploits, as you can see in their list of modules. This makes writing your
own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit
shellcode of dubious quality. One free extra is Metasploitable, an intentionally insecure Linux
virtual machine you can use for testing Metasploit and other exploitation tools without hitting
live servers.
Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon
sprouted commercial variants. The Framework itself is still free and open source, but they now
also offer a free-but-limited Community edition, a more advanced Express edition ($3,000 per
year per user), and a full-featured Pro edition ($15,000 per user per year). Other paid exploitation
tools to consider are Core Impact (more expensive) and Canvas (less).
The Metasploit Framework now includes an official Java-based GUI and also Raphael Mudge's
excellent Armitage. The Community, Express, and Pro editions have web-based GUIs. Read 15
reviews.
Latest release: version 4.11 on Dec. 18, 2014 (10 months, 3 weeks ago).

A Java-based web proxy for assessing web application vulnerability. It supports editing/viewing
HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a
web traffic recorder, web spider, hash calculator, and a scanner for testing common web
application attacks such as SQL injection and cross-site scripting. Read 4 reviews.
Latest release: version 3.2.13 on Aug. 8, 2006 (9 years, 3 months ago).

You might also like