$ Ethical Hacker
code
Hacking ToolKit
Access our comprehensive collection of ethical hacking tools, resources, and utilities. Everything you need for penetration testing and cybersecurity research.
search
filter_alt
import_contacts
Hacking Tool Categories
Footprinting and Reconnaissance 10
Search Engines5
Search Operators
Google Hacking Database
Startpage
NAPALM FTP Indexer
Shodan
Web Services15
Netcraft
Sublist3r
Turbolist3r
Pentest-Tools
Google Earth
Intelius
theHarvester
Google Finance
Tor Browser
Censys
EDGAR Database
D&B Hoovers
SimilarWeb
Opencorporates
subDomainsBrute (B)
Social Networking Sites4
BuzzSumo
Followerwonk
Sherlock
Social Searcher
Website Footprinting 21
Burp Suite
OWASP ZAP
WhatWeb
Wappalyzer
Web Data Extractor
Website Mirroring Tool: HTTrack Web Site Copier
archive.org
Octoparse
CeWL tool
RSMangler
Mentalist
Metagoofil
WebSite-Watcher
Total visitors
Page views
Bounce rate
Live visitors map
Site ranking
Track Visitors and monitor sales
Cloudmare (B)
p0f
Email Footprinting2
Infoga (B)
eMailTrackerPro (A)
Whois Footprinting9
RIRs5
ARIN
AFRINIC
APNIC
RIPE
LACNIC
Whois Lookup
who.is
tamos (A)
IP2Location (A)
gofindwhois
INTERNETWORKING
WHOIS Lookup
Betterwhois
DNS Footprinting4
DNSstuff
DNS Records
DNSRecon (B)
Reverse IP Domain Check
Network Footprinting3
Traceroute
Path Analyzer Pro
VisualRoute
More OSINT Tools35
Maltego (A,B)
Recon-ng (B)
FOCA (B)
OSRFramework (B)
OSINT Framework (B)
Recon-Dog (B)
Th3Inspector (B)
Raccoon (B)
PENTMENU (B)
Fast Google Dorks Scan (B)
0xdork(B)
HackerTarget ToolKit (B)
Open Corporates (B)
Drishti (B)
FINDMYASS TOOL (B)
trendsmap
UserFinder (B)
Devils Eye (B)
CloudUnflare (B)
Raymond Tool (B)
vulnx (B)
SPY (B)
Terra (B)
Striker (B)
SiteBroker (B)
TheScrapper (B)
OSINT? WTF??
Cyber detective OSINT tools collection
Crunchbase
inc.com
pipl.com
pokeo.com
hostmap (B)
Dmitry
p0f
Mind map creator tools2
FreeMind
Xmind
Scanning Networks 17
Nmap (B)
RustScan (B)
Hping2/Hping3
Metasploit (B)
Masscan (B)
NetScanTools Pro
Unicornscan
SolarWinds Port Scanner (A)
PRTG Network Monitor
OmniPeek Network Protocol Analyzer (A)
Angry IP Scanner
SuperScan
Passive OS fingerprinting (p0f)
Mobile Tools3
IP Scanner
Fing
Network Scanner
Proxy Tools7
Proxy Switcher
Kalitorify (B)
CyberGhost VPN
Tor
CCProxy
Hotspot Shield
Proxy Tools for Mobile3
Shadowsocks
ProxyDroid (B)
Proxy Manager
Anonymizers5
Whonix
Psiphon
Proxy Manager
Proxy Manager
Anonymizers for Mobile3
Orbot
Psiphon
OpenDoor
Network Discovery and Mapping Tools7
Network Topology Mapper (A)
OpManager
The Dude
NetSurveyor
NetBrain
Spiceworks Network Mapping Tool
Network Discovery Tools for Mobile2
Network Analyzer
PortDroid Network Analysis
Enumeration18
NetBIOS Enumeration17
enum4linux
enum4linux-ng
smbclient
smbmap
Nbtstat
Net services commands
Net view
Net use
Winfigerprint
Winfo
DumpSec
sid2user
NetBIOS Enumerator
Advanced IP Scanner
Hyena
Nsauditor Network Security Auditor
Cheat Cheat
Enumerating User Accounts1
Cheat Cheat
Enumerating Shared Resources1
Cheat Cheat
SNMP Enumeration9
Snmpwalk
Snmpset
Nmap NSE
Snmpcheck
SoftPerfect Network Scanner (A)
OpUtils
PRTG Network Monitor (A)
Engineer’s Toolset (A)
Cheat Cheat
LDAP Enumeration7
Softerra LDAP Administrator
LDAP Admin Tool
LDAP Account Manager
LDAP Search
JXplorer
Active Directory Explorer
Cheat Cheat
NTP Enumeration5
PRTG Network Monitor (A)
Wireshark
udp-proto-scanner
NTP Server Scanner
Cheat Cheat
NFS Enumeration3
RPCScan (B)
SuperEnum
Cheat Cheat
SMTP Enumeration3
NetScanTools Pro
smtp-user-enum
Cheat Cheat
DNS Enumeration14
nslookup and dig Command
DNSRecon
LDNS
Reverse DNS lookup
MX Lookup
Reverseip
Robtex
fierce tool
dnsenum
dnsrecon
DNSdumpster
DNSEnum (B)
Dnsmap (B)
Cheat Cheat
IPsec Enumeration2
ike-scan
Cheat Cheat
VoIP Enumeration2
Svmap
Cheat Cheat
RPC Enumeration2
NetScanTools Pro
Cheat Cheat
Unix/Linux User Enumeration4
rusers command
rwho command
finger command
Cheat Cheat
Telnet Enumeration1
Cheat Cheat
FTP Enumeration1
Cheat Cheat
TFTP Enumeration2
PortQry
Cheat Cheat
IPv6 Enumeration3
Enyx
IPv6 Hackit
Cheat Cheat
BGP Enumeration2
BGP Toolkit
Cheat Cheat
Vulnerability Analysis17
Tools for Mobile2
Scoring Systems and Databases5
System Hacking21
Password Recovery Tools7
Elcomsoft Distributed Password Recovery (A)
OSForensics
Password Recovery Toolkit
Passware Kit Forensic
hashcat
Windows Password Recovery Tool (A)
PCUnlocker (A)
Extract the Password Hashes5
Password-Cracking Tools15
Detect LLMNR/NBT-NS Poisoning3
Exploit Sites4
Buffer Overflow Detection Tools7
Privilege Escalation Tools16
DLL and Dylib Hijacking4
Spectre and Meltdown Vulnerabilities2
Tools for Executing Applications1
Keyloggers3
Hardware Keyloggers5
Keyloggers for Windows6
Keyloggers for Mac6
Spyware Tools8
Desktop and Child-Monitoring Spyware5
Audio Spyware5
Video Spyware4
Cellphone Spyware5
GPS Spyware5
Anti-Keyloggers6
Anti-Spyware6
Anti-Rootkits6
NTFS Stream Detectors6
Steganography8
Whitespace Steganography1
Image Steganography6
Document Steganography6
Video Steganography4
Audio Steganography6
Folder Steganography6
Spam/Email Steganography2
Tools for Mobile Phones6
Steganography Detection Tools8
Clearing Logs1
Active Directory1
Malware Threats28
Creating a Virus7
Malware Analysis5
Virtual Machines Tools4
Network and Internet Simulation Tools4
OS Backup and Imaging Tools4
File Fingerprinting6
Malware Scanning7
Performing Strings Search6
Identifying Packing/Obfuscation Methods4
Portable Executables Information4
Identifying File Dependencies4
Port Monitoring7
Process Monitoring6
Registry Monitoring6
Windows Services Monitoring6
Startup Programs Monitoring5
Event Logs Monitoring/Analysis5
Installation Monitoring5
Files and Folders Monitoring6
Device Drivers Monitoring6
Network Traffic Monitoring/Analysis6
DNS Monitoring/Resolution4
API Calls Monitoring4
Anti-Trojan Software11
Antivirus Software12
Fileless Malware Detection Tools6
Sniffing24
Hardware Protocol Analyzers7
MAC Flooding1
DHCP Starvation Attack5
ARP Poisoning Tools10
ARP Spoofing Detection Tools5
MAC Spoofing Tools6
DNS Poisoning Tools6
Sniffing Tools for Mobile Phones3
Promiscuous Detection Tools2
Social Engineering3
Phishing Tools6
Anti-Phishing Toolbar3
Social Engineering Tools7
Denial-of-Service5
DoS/DDoS Attack Tools8
DoS/DDoS Attack Tools for Mobiles3
DoS/DDoS countermeasure tools3
DoS/DDoS Protection Tools10
DoS/DDoS Protection Services6
Session Hijacking4
Session Hijacking Tools6
Tools for Mobile Phones3
Detection Tools6
Prevention Tools6
Evading IDS, Firewalls, and Honeypots11
Intrusion Detection Tools7
Tools for Mobile Devices3
Intrusion Prevention Tools6
Firewall Solutions7
Honeypot Tools6
Bypass Blocked Sites Using Anonymous Website Surfing Sites10
HTTP Tunneling Tools4
SSH Tunneling Tools2
DNS Tunneling Tools1
IDS/Firewall Evading Tools6
Packet Fragment Generator Tools6
Honeypot Detection Tools2
Hacking Web Servers16
Information Gathering11
Web Server Footprinting Tools10
Website Mirroring Tools6
Finding Default Credentials of Web Server8
Finding Default Content of Web Server1
Directory Fuzzing of Web Server4
Vulnerability Scanning5
Session Hijacking5
Web Server Password Hacking5
Web Server Attack Tools5
Patch Management Tools6
Web Application Security Scanners17
Web Server Security Scanners6
Web Server Malware Infection Monitoring Tools6
Web Server Security Tools6
Web Server Pen Testing Tools5
Hacking Web Applications14
OWASP Top 10 Application Security Risks2
Footprint Web Infrastructure6
Server Discovery3
Whois Lookup4
DNS Interrogation4
Port Scanning4
Service Discovery3
Detecting Web App Firewalls and Proxies4
Hidden Content Discovery6
Detect Load Balancers4
Analyze Web Applications5
Identify Entry Points for User Input4
Identify Server-Side Technologies2
Identify Server-Side Functionality3
Identify Files and Directories4
Identify Web Application Vulnerabilities6
Attack Authentication Mechanism2
Password Attacks And Cracking7
Cookie Exploitation Tools4
Attack Web Services3
Web Application Hacking Tools15
Web Shell Tools6
Gaining Backdoor Access via Web Shell2
Web Shell Detection Tools5
Web Application Fuzz Testing5
Application Whitelisting and Blacklisting Tools5
Web Application Security Testing Tools8
Web Application Firewalls6
SQL Injection4
Identifying Data Entry Paths2
SQL Injection Tools8
Tools for Mobile Devices3
SQL Injection Detection Tools17
Hacking Wireless Networks21
Wi-Fi Discovery Tools6
Mobile-based Wi-Fi Discovery Tools5
GPS Mapping Tools7
Wi-Fi Hotspot Finder Tools5
Wireless Attacking Tools1
Cracking WEP/WPA/WPA2 Tools9
WEP/WPA/WPA2 Cracking Tools for Mobile4
Wi-Fi Packet Sniffers4
Wi-Fi Traffic Analyzer Tools6
WarDriving Tools5
RF Monitoring Tools5
Raw Packet Capturing Tools5
Spectrum Analyzing Tools5
Bluetooth Reconnaissance4
Bluetooth Hacking Tools5
Wi-Fi Security Auditing Tools6
Wi-Fi IPSs6
Wi-Fi Predictive Planning Tools6
Wi-Fi Vulnerability Scanning Tools6
Bluetooth Security Tools5
Wi-Fi Security Tools for Mobile6
Hacking Mobile Platforms10
Android Devices8
Android Rooting Tools8
Hacking Android Devices9
Android-based Sniffers6
Android Hacking Tools6
Android Security Tools6
Android Device Tracking Tools7
Android Vulnerability Scanners7
Online Android Analyzers6
iOS Devices4
iOS Hacking Tools8
iOS Device Security Tools6
iOS Device Tracking Tools6
Mobile Device Management Solutions7
Source Code Analysis Tools6
Reverse Engineering Tools6
App Repackaging Detector1
Mobile Protection Tools8
Mobile Anti-Spyware6
Mobile Pen Testing Toolkit1
IoT and OT Hacking2
IoT10
Information Gathering6
Vulnerability Scanning8
Sniffing8
Analyzing Spectrum and IoT Traffic2
IoT Attack Tools12
Gaining/Maintain Remote Access3
IoT Hacking Tools6
IoT Device Management6
IoT Security Tools and Solutions16
OT9
Information Gathering9
Vulnerability Scanning3
Sniffing and Analyzing3
Discovering ICS/SCADA1
Hacking ICS2
Hardware Tools9
Hacking Modbus Slaves1
Hacking PLC1
OT Hacking Tools6
OT Security Tools6
Cloud Computing19
Cloud Service Providers4
Container Management Platforms6
Kubernetes Platforms6
Serverless Computing Frameworks6
Container Vulnerability Scanning Tools1
Kubernetes Vulnerability Scanning Tools1
Enumeration Tools3
Exploiting Amazon Cloud & Docker Containers2
Cracking AWS Access Keys1
AWS Hacking Tool1
Escalating Privileges2
Cloud Security Tools8
Container Security Tools6
Kubernetes Security Tools6
Serverless Application Security Solutions6
Cryptography10
MD5 and MD6 Hash Calculators6
Hash Calculators for Mobile4
Cryptography Tools6
Cryptography Tools for Mobile5
Cryptography Toolkits6
Email Encryption Tools6
Disk Encryption Tools8
Cryptanalysis Tools6