You are on page 1of 8

S.

no Tool Name
1 Zphisher
2 Osi instagram hacking tool
3 Inshackle
4 Nexphisher
5 socialphish
6 Kali linux password cracking tool
7 Kali linux information gattering tool
8 ethical hacking with python
9 shellphish tool
10 Blackphish
11 Maskphish
12 Unfollow-plus
13 How to create facebook phishing p
14 Blackeye phishing tool
15 Hidden-eye
16 sherlock
17 XCTR-Hacking tool
18 Kithack
19 How to hacker use social engineer
20 IP-tacker tool
21 Terra
22 Top 10 kali linux hacking tool
23 Dmirty
24 Creating phishing page on website
25 Recon-ng information gathring toolin
26 infoga
27 Darkslide
28 Authentication bypass using SQL in
29 infosploit
30 How to use twin
31 Hacking tolol all in one
32 uDork
33 Kali linux wireless attack tool
34 Onex-hacking tgools liberary
35 pagodo
36 Kali linux vulnerability analysis tool
37 Gobuster
38 Lab security framework
39 FGDUMP
40 Blackphish
41 Goldeneye
42 Storm breaker
43 Vault
44 Joomscan
45 Crosslinked
46 BillCipher
47 PwnXss
48 Linux networking Tool
49 Cewl Tool
50 Commix
Discription
It is used to do phishing attacks on Target. Zphisher is easier than Social Engineering Toolkit
This is a free and open-source tool used for performing reconnaissance on Instagram accounts
Inshackle is used to perform reconnaissance on Instagram accounts and profiles.
It was initially developed to carry out phishing assaults through social engineering.
which is used to do phishing attacks on Target. Socialphish is more user-friendly Social Engineering Toolkit.
is used in most of the parts of hacking. Exploitation uses it to exploit the applications by cracking their administrator or other account passwor
use it for Hacking. To obtain more relevant results, we have to gather more information about the target to increase the probability of a succes
To crack passwords or to steal data? No, it is much more than that. Ethical hacking is to scan vulnerabilities and to find potential threats on
Shellphish is easier than Social Engineering Toolkit. It contains some templates generated by another tool called SocialFish and offers phish
is used to do phishing attacks on Target. Blackphish is easier than Social Engineering Toolkit
Maskphish is a very useful tool and easy to use. This tool is written in bash language. This tool is a bash script
he tool is an automated bot. The tool is very useful when you want to get the following list of Instagram usernames.
Phishing is the technique to create a similar type of web page to the existing web page.
Blackeye contains some templates generated by another tool called Blackeye. This tool makes it easy to perform phishing attacks
There are various techniques to make a phishing page. HiddenEye is an automated tool that is the best in the category of Phishing
Sherlock is used to finding usernames on social media on 300 sites. As you know many users register themselves on social media platforms
This is a framework similar to Metasploitable 1 and Metasploitable 2 which makes it easy to use. XCTR-Hacking-Tools framework is written i
It is designed to automate the process of downloading and installing different tools for penetration testing
ethical hackers need to understand how to effectively use social media and human interaction to obtain sensitive information.
his tool is an IP-Tracer tool that is powered by an IP-API,-api which is an API used to retrieve information about IP geolocation
Terra is a free and open-source tool available on GitHub which can be used to perform reconnaissance on Instagram account/profiles.
Kali Linux is a specially designed OS for network analysts, Penetration testers, or in simple words, it is for those who work under the umbrella
The tool is used for information gathering. You can download the tool and install in your Kali Linux.
It can be done by any individual with a mere basic requirement of Kali Linux (or any other Linux Distribution).
This tool can be used to get information about our target(domain). The interactive console provides a number of helpful features, such as c
Infoga is used for scanning email addresses using different websites and search engines for information gathering and finding information a
DarkSide is used for reconnaissance. Darkside is used for information gathering of the target. This tool is used to perform social engineering a
SQL injection is a technique used to exploit user data through web page inputs by injecting SQL commands as statements
his tool can be used to get information about our target(domain). We can target any domain using InfoSploit. The interactive console provides
TWINT is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter’s API.
s used to scan websites for information gathering and find vulnerabilities in websites and webapps
oogle Dorking is the technique used for advanced searching. Google Dorking can be beneficial in victim domain detection or collecting some s
Hacking wifi includes capturing a handshake of a connection and cracking the hashed password using various attacks like the dictionary attack
These tools are very useful to security researchers and penetration testers.
Firing a single query all the time on google becomes difficult as this can take more time, so we can automate this Dorking task through automa
These vulnerabilities act as an injection point or a point that could be used by an attacker as a launchpad to execute the attack.
As a programing language, Go is understood to be fast. It also has excellent help for concurrency, so that Gobuster can benefit from multiple
Lab Security is used for scanning IP and extracting useful information from the website.
technique used by the ethical hacker that helps the intruder gain full access to the operating system of a remote machine.
is used to do phishing attacks on Target. Blackphish is easier than the Social Engineering Toolkit.
We can perform a denial of service attack using this tool. It’s a framework written in .NET Core.
Storm breaker is a social engineering tool that can be used to access the location, webcam, microphone, and Os Password Grabber Using Ng
Vault tools can be used in every phase of hacking like Reconnaissance, Scanning, and also in exploitation
A hacker can take advantage of that vulnerability and can access the website data. Joomscan is a tool that can be used to find those vulnerabi
This tool used a technique called performing enumerating using search engine scrapping to collect employee data from LinkedIn. This techniq
BillCipher is based upon Open Source Intelligence (OSINT), the easiest and useful tool for reconnaissance.
Security of our websites plays an important role. Cross-site scripting or XSS is a vulnerability that can be used to hack websites.
Network information can be obtained using utilities such as ping, finger, traceroute, host, dig, nslookup etc. These are useful for smaller ne
Cewl is a Ruby program that crawls a URL to a defined depth, optionally following external links, and produces a list of keywords that passw
This user data can be of any type which can be HTTP headers or cookies or forms etc.
How to download
https://docs.google.com/document/d/1niF_2V8JraqehNtwKwca_nMXZzzEaJ48EEDjA4F9xSE/edit?usp=sharing
https://docs.google.com/document/d/1Np3kuSUvWvfrX5JI7tarKVjx_H1Lp_tl0QUcAC_JKxE/edit?usp=sharing
https://docs.google.com/document/d/140u704YnPGQQ6lk2Q4QvZIBDILrrkt0AXNHHQnJaSQo/edit?usp=sharing
https://docs.google.com/document/d/1l6aar1d7LInLLitS7qO5xhnSy1fWsS1tdmyhf-6dd1o/edit?usp=sharing
https://docs.google.com/document/d/1MhMOVFhERnD1VGkse-YI9XVBPw9RMjAAkxlzgPnx_e4/edit?usp=sharing
https://docs.google.com/document/d/1G_pocV6FoELeLpv0cUZG0V9cEZDk-qHeuOKhQ0LpgyQ/edit?usp=sharing
https://docs.google.com/document/d/1gt_gaN8pUDAU1uGHIae-LXFp1pGC12Yfp1IZoD0B8yc/edit?usp=sharing
https://docs.google.com/document/d/1AEOJ637U5C8-Fr_tBomstMb0DDFW-2PWzm45cHumNLg/edit?usp=sharing
https://docs.google.com/document/d/1jDSFVN20pAFs3CgQa6Gjd1qpAtHZefoFDykZOPxlNfA/edit?usp=sharing
https://docs.google.com/document/d/14293O2V3wVOpEVfs1KQ2_B1_ZUVi5PIvjRHKJ9Wm2_g/edit?usp=sharing
https://docs.google.com/document/d/12iiqN3xSVVmPYg1eQJQ_Q-GwJOn50DRp3cTAWMK5j-M/edit?usp=sharing
https://docs.google.com/document/d/12t37M4JIOSmSZ0J05y5jjtsKnd_N_vdvcWyYGdJjjXo/edit?usp=sharing
https://docs.google.com/document/d/1aePByUJXksaBSetlxFT8CcxFaV61BJi_a8QZU2wyQQg/edit?usp=sharing
https://docs.google.com/document/d/1S0gVCbX-qi2HrUg5gv10CMliMin_dVmu7AYi6l6aToI/edit?usp=sharing
https://docs.google.com/document/d/1fwAuIUgqWaW3ndyNiErCqfkYm-HwlJ4YDP9qboEV1Rk/edit?usp=sharing
https://docs.google.com/document/d/1W5RoQhDEqsg11XhXrmxE3tTRaIcjITmEY3waR7CX-sg/edit?usp=sharing
https://docs.google.com/document/d/1ku764D4Yvh7I9G-6-fy-mszKddjuyWYnwPYjI_sGGpw/edit?usp=sharing
https://docs.google.com/document/d/1_5ijWigW-0oy-otoxheBhTJrqop-0vDuwquRElRhZYU/edit?usp=sharing
https://docs.google.com/document/d/1mcG0iKGkXsQUStnClxoLe1t6fhRrPCpcScvmtsGz5Dg/edit?usp=sharing
https://docs.google.com/document/d/1aGTv-fKeigymAt866QzLPqRajAZVXiyUQM_xBm6rQYc/edit?usp=sharing
https://docs.google.com/document/d/1-YevsvvVSh8OCWMS4gTfAjjAauNka3twClWkVxmv9kc/edit?usp=sharing
https://docs.google.com/document/d/1vXmFP-iGG3hCi1VjlmEnEkvXp4qN2Cx28uM2XGl8ZMM/edit?usp=sharing
https://docs.google.com/document/d/1B0ecxQ7IGJDWjsof0a3ShLMK4Df12OAO5uBd44j3moM/edit?usp=sharing
https://docs.google.com/document/d/12xYsjCvhXpnVqy4PQmZV8bIIOEfhETm0q5ut0yffVR8/edit?usp=sharing
https://docs.google.com/document/d/1yWkJ3gRJNgDSj5G3mhPcgZqt4BwkPxL7SR4xVAfbenU/edit?usp=sharing
https://docs.google.com/document/d/1o6qYtNyYTtMN4rYYhq2gMRk9b4uGm2Oz0qVGynU4zTU/edit?usp=sharing
https://docs.google.com/document/d/1ktSOr47RaPNl-Z_mCAppRA6PEdA2ECe_p0Xaj_jqsac/edit?usp=sharing
https://docs.google.com/document/d/1TbrTnJHZNMES13MZrHxVKFX2lDXgZpJyOyXvzdifIpE/edit?usp=sharing
https://docs.google.com/document/d/1lnZAymSNfx6XjkG5gqpZpRxFjcoXhA_0icP8QLr-yGA/edit?usp=sharing
https://docs.google.com/document/d/1doxxv-cQanzGCAOImW9nL5wsfHaCJXjbfvoSv1e7J9Q/edit?usp=sharing
https://docs.google.com/document/d/1XdN23no2yZuPhdkPcChe_7hZ585Vd_zQkMh88YWiR9I/edit?usp=sharing
https://docs.google.com/document/d/1sa_Jd-c-T99PmJV6mA3fuptrkex54XJjlTxhqhAEwK4/edit?usp=sharing
https://docs.google.com/document/d/1Vxu8_5vmTzV6ILDUyty72-efaepqwhfiot75bqqYdDQ/edit?usp=sharing
https://docs.google.com/document/d/1_AIfwv7RAluRIdMDKrDqcDI_9GVsC5IrPWAgXeSHaa8/edit?usp=sharing
https://docs.google.com/document/d/1N-VfYlc3VvWq4jn_9ktvftzGyZEBSciswpnGKxkJHTQ/edit?usp=sharing
https://docs.google.com/document/d/1AssV3QRC_NUIzePyGOQfLKsJkMW4f8DlP7Pbk6-1hr0/edit?usp=sharing
https://docs.google.com/document/d/1J5flMhWrytAdXLz8Hf_BZWBDxMFFVI5HVLuEGh0J7UM/edit?usp=sharing
https://docs.google.com/document/d/13uYDy0PCSHfqiNdVOIDylbNWBYNexbKgu5iV5amAH2A/edit?usp=sharing
https://docs.google.com/document/d/1LN900fCDJXxv_U4x_mJJY7nq9aY_v2OyODiqtYkxp1U/edit?usp=sharing
https://docs.google.com/document/d/1ZcQfsBt_xz1vlIMDVGlHxx1quEKRYmdOig6bWC9B9PQ/edit?usp=sharing
https://docs.google.com/document/d/1AF19VG31KGAXJlFU9iJCHgjd_Q_LceAn539kKUCtAkQ/edit?usp=sharing
https://docs.google.com/document/d/1h0EkmNgONMXkdoqhBqL6__Diag3JiO1lodtI-KkAISU/edit?usp=sharing
https://docs.google.com/document/d/1N7qA2T1-bLIGvQyl8TfbyZ4XTOLO1KFoPPYCAe1X-eE/edit?usp=sharing
https://docs.google.com/document/d/1go5_WUAs3iAzd-HZM9I2Om92BJCrfpmYa0ckmPp2KWQ/edit?usp=sharing
https://docs.google.com/document/d/1aUWq8Kv3b6Tmsd943OkQ0KdOJbXgJWuyuh_p_U-7Rco/edit?usp=sharing
https://docs.google.com/document/d/17GT0jAHUZEYse8g6076zM4sUJ2UIFNtr0FPyX6NDfkE/edit?usp=sharing
https://docs.google.com/document/d/13T4EnWlCTFOOjUCFDQWFpBvNgB5q2h0LYdKbgcQwsm0/edit?usp=sharing
https://docs.google.com/document/d/1cSt4Ei1kMD0vFZ4N2Slm4W1SrJiedSdUffgWAk8Lzc4/edit?usp=sharing
https://docs.google.com/document/d/1DtYMr6jm7kZ_g03pbH3RlP7_VDkKWERMP2c0UeOyVjA/edit?usp=sharing
https://docs.google.com/document/d/1-F-N4m0EjDARuIpqLbV1f7Rc3Z5imWoLoKt1OtBr3T8/edit?usp=sharing
/edit?usp=sharing
dit?usp=sharing
Qo/edit?usp=sharing
dit?usp=sharing
e4/edit?usp=sharing
yQ/edit?usp=sharing
c/edit?usp=sharing
mNLg/edit?usp=sharing
/edit?usp=sharing
_g/edit?usp=sharing
-M/edit?usp=sharing
dit?usp=sharing
edit?usp=sharing
edit?usp=sharing
Rk/edit?usp=sharing
sg/edit?usp=sharing
/edit?usp=sharing
edit?usp=sharing
edit?usp=sharing
c/edit?usp=sharing
kc/edit?usp=sharing
MM/edit?usp=sharing
oM/edit?usp=sharing
/edit?usp=sharing
U/edit?usp=sharing
zTU/edit?usp=sharing
edit?usp=sharing
E/edit?usp=sharing
edit?usp=sharing
/edit?usp=sharing
9I/edit?usp=sharing
edit?usp=sharing
/edit?usp=sharing
8/edit?usp=sharing
edit?usp=sharing
0/edit?usp=sharing
UM/edit?usp=sharing
H2A/edit?usp=sharing
/edit?usp=sharing
Q/edit?usp=sharing
/edit?usp=sharing
/edit?usp=sharing
E/edit?usp=sharing
WQ/edit?usp=sharing
Rco/edit?usp=sharing
E/edit?usp=sharing
wsm0/edit?usp=sharing
/edit?usp=sharing
VjA/edit?usp=sharing
8/edit?usp=sharing

You might also like