- by x32x01 ||
Penetration testing depends on a well-chosen toolkit: scanners to find hosts, password tools to check credentials, web proxies for safe testing, vulnerability scanners to prioritize fixes, and reverse-engineering suites for deep analysis. Below you’ll get a clear, practical guide to the 24 widely-used tools grouped by purpose - so you can build a balanced pentest kit. Always run them in labs or with explicit written permission. ✅
Nmap - host, port, and service discovery.
Example:
Masscan - ultra-fast, Internet-scale port scans. Use it when you need speed.
Example:
Amass - subdomain enumeration and asset mapping for domains. Great for footprinting web targets.
Shodan (CLI) - find internet-facing devices like cameras, routers, and servers.
theHarvester - passive information gathering (emails, domains, hostnames) from public sources.
Why use these first? They give the surface map so you can plan deeper checks without missing obvious targets. 🗺️
Hashcat - GPU-accelerated password cracking. Use responsibly for audits only.
Example:
Hydra - fast protocol brute-force (SSH, FTP, HTTP forms, etc.).
Aircrack-ng - suite for Wi-Fi packet capture, cracking WEP/WPA handshakes.
Kismet - wireless network discovery and sniffing.
Alfa adapters (hardware) - high-power wireless adapters that improve range for practical testing.
Use these to test how strong a password policy is and how resilient wireless networks are to attack.
Burp Suite - interactive web proxy and testing framework. Essential for manual web testing.
OWASP ZAP - open-source web scanner and proxy. Good for automated scans or an extra check.
sqlmap - automates testing and exploitation of SQL injection (authorized use only).
Example:
FFUF / Gobuster - content discovery and fuzzing to find hidden directories and files.
BeEF - browser exploitation framework for testing how browsers can be abused (lab use only).
Pro tip: start with a proxy (Burp/ZAP) then run content discovery (FFUF) to find hidden pages before running automated scans.
Nessus / OpenVAS - full vulnerability scanners with reporting features.
Nikto - web server scanner for common issues and bad configurations.
Nuclei + templates - fast, template-based checks for known issues. Good for CI/CD integration.
Trivy - container and image scanning to catch vulnerabilities in Docker images and CI pipelines.
These tools save time by pointing to likely problems and giving you a baseline for remediation.
Ghidra - full-featured binary reverse-engineering suite from NSA.
radare2 - advanced disassembler and analysis toolkit for binaries.
Volatility - memory forensics to investigate active attacks or suspicious processes.
Binwalk - firmware analysis and extraction for embedded devices.
YARA - write rules to match malware or suspicious patterns across files.
Use these when you need to look under the hood of a binary, firmware, or a memory snapshot.
Use these in isolated lab networks. Do not run them against systems you don’t own or have permission to test. 🚫
Recon & Discovery 🔎
Start with tools that map your target and reveal surface-level info.Nmap - host, port, and service discovery.
Example:
nmap -sC -sV -oA scan_results 192.168.1.0/24Masscan - ultra-fast, Internet-scale port scans. Use it when you need speed.
Example:
masscan 0.0.0.0/0 -p80,443 --rate=10000 -oL results.txtAmass - subdomain enumeration and asset mapping for domains. Great for footprinting web targets.
Shodan (CLI) - find internet-facing devices like cameras, routers, and servers.
theHarvester - passive information gathering (emails, domains, hostnames) from public sources.
Why use these first? They give the surface map so you can plan deeper checks without missing obvious targets. 🗺️
Credentials & Wireless 🛡️📶
These tools help test authentication and wireless defenses.Hashcat - GPU-accelerated password cracking. Use responsibly for audits only.
Example:
hashcat -m 1000 hash.txt wordlist.txt --forceHydra - fast protocol brute-force (SSH, FTP, HTTP forms, etc.).
Aircrack-ng - suite for Wi-Fi packet capture, cracking WEP/WPA handshakes.
Kismet - wireless network discovery and sniffing.
Alfa adapters (hardware) - high-power wireless adapters that improve range for practical testing.
Use these to test how strong a password policy is and how resilient wireless networks are to attack.
Web Apps & Browser Exploitation 🌐
Web apps are a top target. Use proxies, scanners, and discovery tools carefully.Burp Suite - interactive web proxy and testing framework. Essential for manual web testing.
OWASP ZAP - open-source web scanner and proxy. Good for automated scans or an extra check.
sqlmap - automates testing and exploitation of SQL injection (authorized use only).
Example:
Code:
sqlmap -u "http://target.com/page?id=1" --dbs --batch BeEF - browser exploitation framework for testing how browsers can be abused (lab use only).
Pro tip: start with a proxy (Burp/ZAP) then run content discovery (FFUF) to find hidden pages before running automated scans.
Vulnerability Scanners & Assessment 🧰
Automated scanners help prioritize what to patch first.Nessus / OpenVAS - full vulnerability scanners with reporting features.
Nikto - web server scanner for common issues and bad configurations.
Nuclei + templates - fast, template-based checks for known issues. Good for CI/CD integration.
Trivy - container and image scanning to catch vulnerabilities in Docker images and CI pipelines.
These tools save time by pointing to likely problems and giving you a baseline for remediation.
Reverse Engineering & Forensics 🧩
For deep analysis and incident response, use reverse engineering and memory tools.Ghidra - full-featured binary reverse-engineering suite from NSA.
radare2 - advanced disassembler and analysis toolkit for binaries.
Volatility - memory forensics to investigate active attacks or suspicious processes.
Binwalk - firmware analysis and extraction for embedded devices.
YARA - write rules to match malware or suspicious patterns across files.
Use these when you need to look under the hood of a binary, firmware, or a memory snapshot.
How to Build a Balanced Pentest Kit ⚖️
- Recon first: Nmap, Masscan, Amass.
- Web testing: Burp, ZAP, sqlmap, FFUF.
- Scan & prioritize: Nessus/OpenVAS, Nuclei, Trivy.
- Auth checks: Hashcat, Hydra.
- Deep analysis: Ghidra, Volatility, Binwalk.
Quick Command Examples for Lab Practice 🧪
- Full TCP port scan with service versions:
Code:
nmap -p- -sV -T4 192.168.1.100 -oN nmap_full.txt - Brute force a login form with Hydra (demo):
Code:
hydra -l admin -P /path/wordlist.txt target.com http-post-form "/login:username=^USER^&password=^PASS^:F=incorrect" - Discover hidden paths with FFUF:
Code:
ffuf -u http://target/FUZZ -w /usr/share/wordlists/dirb/common.txt -t 40 - Scan a Docker image with Trivy:
Code:
trivy image --severity HIGH,CRITICAL myapp:latest Responsible Testing & Ethics ⚖️
- Always get explicit, written permission before testing a system.
- Keep detailed logs and copies of permissions and communications.
- If you discover a critical vulnerability, follow a responsible disclosure process.
- Respect privacy and follow the law.
Tool Roles at a Glance (short cheat sheet) 📋
- Recon: Nmap, Masscan, Amass, Shodan, theHarvester
- Credentials/Wireless: Hashcat, Hydra, Aircrack-ng, Kismet, Alfa adapters
- Web: Burp Suite, OWASP ZAP, sqlmap, FFUF, BeEF
- Vulnerability Scanning: Nessus, OpenVAS, Nikto, Nuclei, Trivy
- Reverse/Forensics: Ghidra, radare2, Volatility, Binwalk, YARA
Final Thoughts ✨
This list of 24 tools gives you a balanced pentest toolkit: from quick discovery to deep reverse engineering. The key is practice: build reproducible lab tests, document findings clearly, and prioritize fixes based on risk. With consistent learning and ethical practice, you’ll turn tool knowledge into real security improvements. Happy testing - safely! 🔐 Last edited: