Top 6 Ethical Hacking Tools Ethical Hacking. 10:24 AM EH Tools, Hacking, Kismet. Nessus has been developed by Tenable network security, it is available for free of cost for non-enterprise environment means for home user. It is a network vulnerability scanner and use. 9 Free and Open Source Ethical Hacking Tools to Use: There is an ocean of ethical hacking tools to choose from – the real challenge is to find the best ones for the job. These nine tools offer just a slice of the available offerings, but they are some of the most popular and most well-regarded – and all of them are free. Nessus is supported by a variety of platforms including Windows 7 and 8, Mac OS X, and popular Linux distros like Debian, Ubuntu, Kali Linux etc. This top free hacking tool of 2019 works with the help of a client-server framework. Developed by Tenable Network Security, the tool is one of the most popular vulnerability scanners we have. A Quick Guide to Ethical Hacking + Top Hacking Tools. 9 Free and Open Source Ethical Hacking Tools to Use: There is an ocean of ethical hacking tools to choose from – the real challenge is to find the best ones for the job. These nine tools offer just a slice of the available offerings, but they are some of the most popular and most well.

We have compiled a list of top hacking software and tools of 2019 with their best features and download links. This list is based on industry reviews, your feedback, and our own experience. This list will tell you about the best software used for hacking purposes featuring port scanners, web vulnerability scanner, password crackers, forensics tools, traffic analysis, and social engineering tools.

Read about them, learn how to use them and share your reviews to make this list better. If you’re interested in ethical hacking, you can also check our dedicated article on operating systems for ethical hacking and pentesting.

Disclaimer: Fossbytes is publishing this article just for educational purposes and we don’t promote malicious practices. Use these tools only for ethical purposes.

13 Best Hacking Software for Windows, Linux, and Mac

1. Metasploit Best collection of exploit tools

Rather than calling Metasploit a collection of exploit tools, I’ll call it an infrastructure that you can utilize to build your own custom tools. This free software is one of the most popular cybersecurity tool that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system.

This top hacking tool package of 2019 lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pin points the vulnerabilities with Nexpose closed–loop integration using Top Remediation reports. Using the open source Metasploit framework, users can build their own tools and take the best out of this multi-purpose hacking tool.

Supported platforms and download:

Metasploit is available for all major platforms including Windows, Linux, and OS X.

2. Acunetix WVS Vulnerability Scanner

Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites from more than 1200 vulnerabilities in WordPress.

Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2019.

Supported platforms and download:

Acunetix is available for Windows XP and higher.

3. Nmap Port scanner tool

Nmap – also known as Network Mapper – falls in the category of a port scanner tool. This free and open source hacking tool is the most popular port scanning tool around that allows efficient network discovery and security auditing. Used for a wide range of services, Nmap uses raw IP packets to determine the hosts available on a network, their services along with details, operating systems used by hosts, the type of firewall used, and other information.

Last year, Nmap won multiple security products of the year awards and was featured in multiple movies including The Matrix Reloaded, Die Hard 4, and others. Available in the command line, Nmap executable also comes in an advanced GUI avatar.

Supported platforms and download:

Nmap is available for all major platforms including Windows, Linux, and OS X.

4. Wireshark Packet analyzer

Wireshark is a well-known packet crafting tool that discovers vulnerability within a network and probes firewall rule-sets. Used by thousands of security professionals to analyze networks and live pocket capturing and deep scanning of hundreds of protocols. Wireshark helps you to read live data from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others.

This free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark. You can also read our dedicated article on the newly released Wireshark 3.0.0.

Supported platforms and download:

This Qt-based network protocol analyzer runs with ease on Linux, Windows, and OS X.

5. oclHashcat Password cracking tool

If password cracking is something you do on daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.

oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later and AMD users require Catalyst 15.7 or later.

This tool employs following attack modes for cracking:

  • Straight
  • Combination
  • Brute-force
  • Hybrid dictionary + mask
  • Hybrid mask + dictionary

Mentioning another major feature, oclHashcat is an open source tool under MIT license that allows an easy integration or packaging of the common Linux distros.

Supported platforms and download:

This useful password cracking tool can be downloaded in different versions for Linux, OSX, and Windows.

6. Nessus Vulnerability Scanner

This top free security tool of 2019 works with the help of a client-server framework. Developed by Tenable Network Security, the tool is one of the most popular vulnerability scanners we have. Nessus serves different purposes to different types of users – Nessus Home, Nessus Professional, Nessus Manager and Nessus Cloud.

Using Nessus, one can scan multiple types of vulnerabilities that include remote access flaw detection, misconfiguration alert, denial of services against TCP/IP stack, preparation of PCI DSS audits, malware detection, sensitive data searches etc. To launch a dictionary attack, Nessus can also call a popular tool Hydra externally.

Apart from the above mentioned basic functionalities, Nessus could be used to scan multiple networks on IPv4, IPv6, and hybrid networks. You can set the scheduled scan to run at your chosen time and re-scan all or a subsection of previously scanned hosts using selective host re-scanning.

Supported platforms and download:

Nessus is supported by a variety of platforms including Windows 7 and 8, Mac OS X, and popular Linux distros like Debian, Ubuntu, Kali Linux etc.

7. Maltego Forensics platform

Maltego is an open source forensics platform that offers rigorous mining and information gathering to paint a picture of cyber threats around you. Maltego excels in showing the complexity and severity of points of failure in your infrastructure and the surrounding environment.

Maltego is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning.

Supported platforms and download:

Maltego security tool is available for Windows, Mac, and Linux.

8. Social-Engineer Toolkit

Also featured on Mr. Robot, TrustedSec’s Social-Engineer Toolkit is an advanced framework for simulating multiple types of social engineering attacks like credential harvestings, phishing attacks, and more. On the show, Elliot is seen using the SMS spoofing tool from the Social-Engineer Toolkit.

This Python-driven tool is the standard tool for social engineering penetration tests with more than two million downloads. It automates the attacks and generates disguising emails, malicious web pages and more.

Supported platforms and download:

To download SET on Linux, type the following command:

Apart from Linux, Social-Engineer Toolkit is partially supported on Mac OS X and Windows.

9. Netsparker Web app scanner

Netsparker is a popular web application scanner that finds flaws like SQL injection and local file induction, suggesting remedial actions in a read-only and safe way. As this hacking tool produces a produces a proof of exploitation, you don’t need to verify the vulnerability on your own. Just in case it can’t verify a flaw automatically, it’ll alert you. This hacking tool is very easy to get started with. Simply enter the URL and let it perform a scan. Netsparker supports JavaScript and AJAX-based applications. So, you don’t need to configure the scanner or rely on some complex scanning settings to scan different types of web applications.

If you don’t wish to pay money for the professional version of Netsparker, they’ve also got a demo version that you can use.

Supported platforms and download:

Netsparker web app scanner is available for Windows

10. w3af Web app scanner

w3af is a free and open source web application security scanner that’s widely used by hackers and penetration testers. w3af stands for web application attack and audit framework. Using this hacking tool, one can get security vulnerability information that can be further used in penetration testing engagements. w3af claims to identify more than 200 vulnerabilities (including the likes of cross-site scripting, SQL Injection, PHP misconfigurations, guessable credentials, and unhandled application errors) and make a web application (and website) more secure.

w3af comes both in command line and graphical user interface to suit the needs of a hacker. In less than 5 clicks and using the predefined profile for the beginners, one can audit the security of a web application. As it’s well documented, the new users can easily find their way. Being an open source hacking tool, an experienced developer can play with the code, add new features, and create something new.

Supported platforms and download:

w3af is available for Linux, BSD, and OS X. On Windows, its older versions are supported.

11. John The Ripper

When it comes to the password cracking tools, John The Ripper turns out to be the top-most choice of most of the ethical hackers. This free and open source software is distributed in the form of source code.

John The Ripper is primarily written in C programming language. It has been able to achieve the status of a great companion due to the fact that it’s a combination of many password crackers into one. Different modules grant it the ability to crack the passwords using different encryption techniques

Supported platforms and download:

John The Ripper hacking software is available on a variety of platforms, including Windows, Linux, DOS, OpenVMS, and Unix.

12. Aircrack-ng Password cracking tool

When it comes to password cracking, Aircrack-ng is another option that you can explore. This network suite consists of a detector, traffic sniffer, and password cracker tool. All these tools are command line based and allow heavy scripting.

Microstation connect version history. The product was renamed InRoads when it became available on the InterPro 32 running the CLIX operating system (variant of UNIX). What follows is a brief history of the product: InRoads V3.5 - April 1990. Clix platform support, MicroStation V3.5 support. InRoads V4.0 - April 1991. Clix platform support, MicroStation V4 support. InRoads V5.0 - December 1993. MicroStation was initially developed by Bentley Systems and sold and supported by Intergraph in the 1980s. The latest versions of the software are released solely for Microsoft Windows operating systems, but historically MicroStation was available for Macintosh platforms and a number of Unix-like operating systems. Modeling, Documentation, and Visualization Software. The MicroStation family of products provides traditional CAD capabilities and the power and versatility to precisely view, model, document, and visualize information-rich 2D and 3D designs of all types and scales, working for professionals in every discipline on infrastructure projects of every type. Hi, in the Version list the versions of all Bentley products are listed, not only MicroStation. More about history and MicroStation version is described here. With regards, Jan.

Using Aircrack-ng hacking software, you can capture the packets, export data to text files, perform different attacks, check WiFi cards and drivers capabilities, cracking WEP and WPA PSK, etc.

Supported platforms and download:

Aircrack-ng is available for different platforms like macOS, Linux, FreeBSD, Windows. The Linux version has also been ported to Android as well.

13. Ghidra Reverse Engineering Tool

Ghidra is NSA’s home-grown reverse engineering tool that has been recently open sourced by the American agency. As per NSA, the tool is internally used to dig deep into malware and software to spot vulnerabilities that can be exploited.

One of the most important features of this hacking software is the feature of multi-user support that lets researchers collaborate and reverse engineer a single binary. One can also use the exposed API and create own Ghidra plugin and add-ons for extra functionality.

Supported platforms and download:

Ghidra hacking software is available for Linux, Windows, and macOS.

Other top hacking and security tools of 2019 in multiple categories:

Web Vulnerability Scanners – Burp Suite, Firebug, AppScan, OWASP Zed, Paros Proxy, Nikto, Grendel-Scan

Vulnerability Exploitation Tools – Netsparker, sqlmap, Core Impact, WebGoat, BeEF

Forensic Tools – Helix3 Pro, EnCase, Autopsy

Port Scanners – Unicornscan, NetScanTools, Angry IP Scanner

Traffic Monitoring Tools – Nagios, Ntop, Splunk, Ngrep, Argus

Debuggers – IDA Pro, WinDbg, Immunity Debugger, GDB

Rootkit Detectors – DumpSec, Tripwire, HijackThis

Encryption Tools – KeePass, OpenSSL, OpenSSH/PuTTY/SSH, Tor

Password Crackers – John the Ripper, Hydra, ophcrack

We hope that you found this list helpful. Share your reviews in the comments below and help us improve this list.

Get the best deals on these hacking certification courses:

What are Hacking Tools?

Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution.
In this list we highlight the top 20 tools for Ethical Hacking of web applications, servers and networks

1) Netsparker

Netsparker is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services. It is available as on-premises and SAAS solution.
Features

  • Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology.
  • Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages.
  • REST API for seamless integration with the SDLC, bug tracking systems etc.
  • Fully scalable solution. Scan 1,000 web applications in just 24 hours.

2) Acunetix

Acunetix is a fully automated ethical hacking solution that mimics a hacker to keep one step ahead of malicious intruders. The web application security scanner accurately scans HTML5, JavaScript and Single-page applications. It can audit complex, authenticated webapps and issues compliance and management reports on a wide range of web and network vulnerabilities.

Features:

  • Scans for all variants of SQL Injection, XSS, and 4500+ additional vulnerabilities
  • Detects over 1200 WordPress core, theme, and plugin vulnerabilities
  • Fast & Scalable – crawls hundreds of thousands of pages without interruptions
  • Integrates with popular WAFs and Issue Trackers to aid in the SDLC
  • Available On Premises and as a Cloud solution.

3) Probely

Probely continuously scans for vulnerabilities in your Web Applications. It allows its customers to manage the life cycle of vulnerabilities and provides them with some guidance on how to fix them. Probely is a security tool built having Developers in mind.

Features:

  • Scans for SQL Injections, XSS, OWASP TOP10 and over 5000 vulnerabilities, including 1000 WordPress and Joomla vulnerabilities
  • Full API - All features of Probely are also available through an API
  • Integration with your CI tools, Slack and Jira
  • Unlimited team members
  • PDF Reports to showcase your security
  • Diverse scanning profiles (ranging from safe to aggressive scans)
  • Multiple Environment Targets - Production (non-intrusive scans) and Testing (intrusive and complete scans)

4) InsightVM

InsightVM is a top-ranked vulnerability risk management solution focused on detecting, prioritizing, and remediating vulnerabilities. With InsightVM, you can automatically assess and understand security risk across your entire infrastructure.
Key Features:

  • Live Dashboards
  • Risk Scoring Based on Attacker Analytics
  • Automation-assisted Patching and Automated Containment
  • Cloud and Virtual Infrastructure Assessment
  • Attack Surface Monitoring with Project Sonar
  • Container Assessment
  • IT-Integrated Remediation Projects
  • Goals and SLAs
  • Integrated Threat Feeds
  • Easy-to-use RESTful API

5) SaferVPN

SaferVPN is an indispensable tool in an Ethical hackers arsenal. You may need it to check target in different geographies, simulate nonpersonalized browsing behavior, anonymized file transfers, etc.
Features:

  • No Log VPN with high security and anonymity
  • Very fast speeds with 2000+ servers across continents
  • Based in Hongkong, it does not store any data.
  • Split tunneling and 5 simultaneous logins
  • 24/7 support
  • Supports Windows, Mac, Android, Linux, iPhone, etc.
  • 300,000+ IPs
  • Port Forwarding, Dedicated IO and P2P Protection
  • 31 Day Money-Back Guarantee

6) Burp Suite:

Burp Suite is a useful platform for performing Security Testing of web applications. Its various tools work seamlessly together to support the entire pen testing process. It spans from initial mapping to analysis of an application's attack surface.

Features:

It can detect over 3000 web application vulnerabilities.

  • Scan open-source software and custom-built applications
  • An easy to use Login Sequence Recorder allows the automatic scanning
  • Review vulnerability data with built-in vulnerability management.
  • Easily provide wide variety of technical and compliance reports
  • Detects Critical Vulnerabilities with 100% Accuracy
  • Automated crawl and scan
  • Advanced scanning feature for manual testers
  • Cutting-edge scanning logic

Download link:https://portswigger.net/burp/freedownload

7) Ettercap:

Ettercap is an ethical hacking tool. It supports active and passive dissection includes features for network and host analysis.

Features:

  • It supports active and passive dissection of many protocols
  • Feature of ARP poisoning to sniff on a switched LAN between two hosts
  • Characters can be injected into a server or to a client while maintaining a live connection
  • Ettercap is capable of sniffing an SSH connection in full duplex
  • Allows sniffing of HTTP SSL secured data even when the connection is made using proxy
  • Allows creation of custom plugins using Ettercap's API

Download link: https://ettercap.github.io/ettercap/downloads.html

8) Aircrack:

Aircrack is a trustable ethical hacking tool. It cracks vulnerable wireless connections. It is powered by WEP WPA and WPA 2 encryption Keys.

Features:

  • More cards/drivers supported
  • Support all types of OS and platforms
  • New WEP attack: PTW
  • Support for WEP dictionary attack
  • Support for Fragmentation attack
  • Improved tracking speed

Download link:https://www.aircrack-ng.org/downloads.html

9) Angry IP Scanner:

Angry IP Scanner is open-source and cross-platform ethical hacking tool. It scans IP addresses and ports.

Features:

  • Scans local networks as well as the Internet
  • Free and open-source tool
  • Random or file in any format
  • Exports results into many formats
  • Extensible with many data fetchers
  • Provides command-line interface
  • Works on Windows, Mac, and Linux
  • No need for Installation

Download link: http://angryip.org/download/#windows

10) GFI LanGuard:

GFI LanGuard is an ethical tool that scan networks for vulnerabilities. It can acts as your 'virtual security consultant' on demand. It allows creating an asset inventory of every device.

Features:

  • It helps to maintain a secure network over time is to know which changes are affecting your network and
  • Patch management: Fix vulnerabilities before an attack
  • Analyze network centrally
  • Discover security threats early
  • Reduce cost of ownership by centralizing vulnerability scanning
  • Help to maintain a secure and compliant network

Download link: https://www.gfi.com/products-and-solutions/network-security-solutions/gfi-languard/download

11) Savvius:

It is an ethical hacking tool. It performance issues and reduces security risk with the deep visibility provided by Omnipeek. It can diagnose network issues faster and better with Savvius packet intelligence.

Features:

  • Powerful, easy-to-use network forensics software
  • Savvius automates the capture of the network data required to quickly investigate security alerts
  • Software and integrated appliance solutions
  • Packet intelligence combines deep analysis
  • Rapid resolution of network and security issues
  • Easy to use Intuitive workflow
  • Expert and responsive technical support
  • Onsite deployment for appliances
  • Commitment to our customers and our products

Download link:https://www.savvius.com/distributed_network_analysis_suite_trial

12) QualysGuard:

Qualys guard helps businesses streamline their security and compliance solutions. It also builds security into their digital transformation initiatives. This tool can also check the performance vulnerability of the online cloud systems.

Features:

  • It is trusted globally
  • No hardware to buy or manage
  • It is a scalable, end-to-end solution for all aspects of IT security
  • Vulnerability data securely stored and processed on an n-tiered architecture of load-balanced servers
  • It sensor provides continuous visibility
  • Data analyzed in real time
  • It can respond to threats in a real-time

Download link:https://www.qualys.com/forms/freescan/

13) WebInspect:

WebInspect is automated dynamic application security testing that allows performing ethical hacking techniques. It provides comprehensive dynamic analysis of complex web applications and services.

Features:

  • Allows to test dynamic behavior of running web applications to identify security vulnerabilities
  • Keep in control of your scan by getting relevant information and statistics at a glance
  • Centralized Program Management
  • Advanced technologies, such as simultaneous crawl professional-level testing to novice security testers
  • Easily inform management on vulnerability trending, compliance management, and risk oversight

Download link:https://saas.hpe.com/en-us/software/webinspect

14) Hashcat:

Best Free Ethical Hacking Tools

Hashcat is a robust password cracking ethical hacking tool. It can help users to recover lost passwords, audit password security, or just find out what data is stored in a hash.

Features:

  • Open-Source platform
  • Multi-Platform Support
  • Allows utilizing multiple devices in the same system
  • Utilizing mixed device types in the same system
  • It supports distributed cracking networks
  • Supports interactive pause/resume
  • Supports sessions and restore
  • Built-in benchmarking system
  • Integrated thermal watchdog
  • Supports automatic performance tuning

Download link:https://hashcat.net/hashcat/

15) L0phtCrack:

L0phtCrack 6 is useful password audit and recovery tool. It identifies and assesses password vulnerability over local machines and networks.

Features:

  • Multicore & multi-GPU support helps to optimize hardware
  • Easy to customize
  • Simple Password Loading
  • Schedule sophisticated tasks for automated enterprise-wide password
  • Fix weak passwords issues by forcing password resets or locking accounts
  • It allows multiple auditing OSes

Download link:http://www.l0phtcrack.com/#download-form

16) Rainbow Crack:

RainbowCrack is a password cracking tool widely used for ethical hacking. It cracks hashes with rainbow tables. It uses time-memory tradeoff algorithm for this purpose.

Features:

  • Full time-memory trade-off tool suites, including rainbow table generation
  • It Support rainbow table of any hash algorithm
  • Support rainbow table of any charset
  • Support rainbow table in raw file format (.rt) and compact file format
  • Computation on multi-core processor support
  • GPU acceleration with multiple GPUs
  • Runs on Windows OS and Linux
  • Unified rainbow table file format on every supported OS
  • Command line user interface
  • Graphics user interface

Download link:http://project-rainbowcrack.com/index.htm

17) IKECrack:

IKECrack is an open source authentication crack tool. This ethical hacking tool is designed to brute-force or dictionary attack. This tool also allows performing cryptography tasks.

Features:

  • IKECrack is a tool that allows performing Cryptography tasks
  • Initiating client sends encryption options proposal, DH public key, random number, and an ID in an unencrypted packet to the gateway/responder.
  • It is freely available for both personal and commercial use. Therefore, it is perfect choice for user who wants an option for Cryptography programs

Download link:http://ikecrack.sourceforge.net/

18) IronWASP:

IronWASP is an open source software for ethical hacking too. It is web application vulnerability testing. It is designed to be customizable so that users can create their custom security scanners using it.

Features:

  • GUI based and very easy to use
  • It has powerful and effective scanning engine
  • Supports for recording Login sequence
  • Reporting in both HTML and RTF formats
  • Checks for over 25 types of web vulnerabilities
  • False Positives and Negatives detection support
  • It supports Python and Ruby
  • Extensible using plug-ins or modules in Python, Ruby, C# or VB.NET

Download link:http://ironwasp.org/download.html

19) Medusa

Medusa is one of the best online brute-force, speedy, parallel password crackers ethical hacking tool. This tool is also widely used for ethical hacking.

Features:

  • It is designed in such a way that it is speedy, massively parallel, modular, login brute-forcer
  • The main aim of this tool is to support as many services which allow remote authentication
  • Allows to perform Thread-based parallel testing and Brute-force testing
  • Flexible user input. It can be specified in a variety of ways
  • All the service module exists as an independent .mod file.
  • No modifications are needed to the core application to extend the supported list of services for brute-forcing

Free Ethical Hacking Tools Pdf

Download link: http://foofus.net/goons/jmk/medusa/medusa.html

20) NetStumbler

NetStumbler is used to detect wireless networks on the Windows platform.

Features:

  • Verifying network configurations
  • Finding locations with poor coverage in a WLAN
  • Detecting causes of wireless interference
  • Detecting unauthorized ('rogue') access points
  • Aiming directional antennas for long-haul WLAN links

Download link: http://www.stumbler.net/

21) SQLMap

SQLMap automates the process of detecting and exploiting SQL Injection weaknesses. It is open source and cross platform. It supports the following database engines.

  • MySQL
  • Oracle
  • Postgre SQL
  • MS SQL Server
  • MS Access
  • IBM DB2
  • SQLite
  • Firebird
  • Sybase and SAP MaxDB

It supports the following SQL Injection Techniques;

  • Boolean-based blind
  • Time-based blind
  • Error-based
  • UNION query
  • Stacked queries and out-of-band.

Download link:http://sqlmap.org/

22) Cain & Abel

Cain & Abel is a Microsoft Operating System passwords recovery tool. It is used to -

  • Recover MS Access passwords
  • Uncover password field
  • Sniffing networks
  • Cracking encrypted passwords using dictionary attacks, brute-force, and cryptanalysis attacks.

Download link:http://www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml

23) Nessus

Nessus can be used to perform;

  • Remote vulnerability scanner
  • Password dictionary attacks
  • Denial of service attacks.

Hacking Tools Download Free

It is closed source, cross platform and free for personal use.

Ethical Hacking Software Tools Free Download

Download link:http://www.tenable.com/products/nessus-vulnerability-scanner

Coments are closed
Scroll to top