HACKING TOOLS AND THINGS YOU SHOULD KNOW
1.Tamper Data
2.Hack Bar
3.Live HTTP headers
4.User-Agent Switcher
5.Flagfox
6.Domain Details
7.Cookie Manager+
8.HttpFox
9.XSS Me
10.Fireforce
11.Wappalyzer
12.PassiveRecon
13.Blur
14.Poster
15.NoScript
16.CSRF Finder
17.Copy As Plain Text
18.FoxyProxy Standard
19.RightClickXSS
20.Export/import cookies
21.Firebug
22.CryptoFox
23.NoRedirect
24.Ghostery
25.Privacy Badger
26.Disconnect
27.Adblock Plus
28.Hoxx VPN
29.buffer overflows
1.Network Plus
2.CEH
3.Linux Commands
4.Cmd Commands
5.Kali Linux Tools
6.Windows Tools
7.Learning Bugs
8.Learning Python
9.Learning Ruby
1.DDoS
2.Forensics
3.Programming
4.Exploitation
5.Phone Hacking
6.Server Hacking
7.Client Hacking
8.Website Hacking
9.Network Hacking
10.Wireless Hacking
11.Reverse Engeenering
12.Information Gathering
1.MDK3
2.LOIC
3.HULK
4.DDOSIM
5.Ufonet
6.Hping3
7.Xerxes
8.Hammer
9.Slowloris
10.Websploit
11.GoldenEye
12.Metasploit
13.Aireplay-ng
14.Slowhttptest
15.CMD?
1.COFEE
2.Volafox
3.Autopsy
4.Foremost
5.Hashdeep
6.Binwalk
1.Notepad++
2.Visual Studio
3.Text Editor
Many more…
1.Metasploit
2.Sqlmap
3.Core Imact
4.W3af
5.BeEF
6.Dradis
phone Hacking
1.Metasploit
2.Apktool
3.Droidjack
4.RATs
5.Spywere
6.Backdoor playlode
server Hacking
1.SQLmap
2.Jsql
3.Havij
4.Hydra
5.Metasploit
6.Armitage
7.Brupsuite
8.Owasp-ZAP
9.Netsparker
10.Acunetix
11.OpenVAS
client Hacking
1.Darkcomet
2.FatRat
3.Veil-Evasion
4.Shallter
5.Unicorn
6.Setoolkit
7.Armitage
8.BeEF-Framework
9.EmPyre
10.FakeImageExploiter
11.Pupy
12.DFU-Programmer
13.Cobalt Strike
14.Exploitpack
15.Gcat
16.Crowbar
website Hacking
1.Sniper
2.Owasp-ZAP
3.Brupsuite
4.Netsparker
5.Acunetix
6.SQLmap
7.Xsser
8.WPScan
9.Joomrra
10.Joomscan
11.WPSeku
12.XSStrike
13.Kadimus
14.jexboss
15.CMSmap
16.brut3k1t
17.0d1n
18.CloudFail
19.Arachni
20.Nikto
21.Webscarab
22.Nmap
23.Vbscan
24.Sentry MBA
network Hacking
1.MITMf
2.Bettercap
3.Ettercap
4.Tcpdump
5.Wireshark
6.Driftnet
7.SSLstrip
8.Armitage
9.Metasploit
10.Xerosploit
11.Sparta
12.Hydra
13.some scripts
14Nmap
#Wireless Hacking
1.Wifite
2.Airodump-ng
3.Aireplay-ng
4.Wash
5.WiFi Pumpkin
6.Wifiphisher
7.Fluxion
8.Infernal Twin
9.WPSpin
reverse Engeenering
1.OWASP-ZSC
2.OllyDBG
3.Apktool
1.DDoS
2.Forensics
3.Programming
4.Exploitation
5.Phone Hacking
6.Server Hacking
7.Client Hacking
8.Website Hacking
9.Network Hacking
10.Wireless Hacking
11.Reverse Engeenering
12.Information Gathering
1.Nuke
2.Botnet
3.Zero Day
4.Slowloris
5.SYN Flood
6.Reflected
7.Multi Vector
8.Peer to Peer
9.Ping of Death
10.Protocol Flood
11.Application Level
1.History
2.Etymology
3.Maturation
4.Toxicology
5.References
6.Bibliography
7.Fingerprints
8.Anthropometry
1.C
2.PHP
3.ASP
4.Ruby
5.Bash
6.Perl
7.Python
8.Assembly
9.JavaScript
And many more,…
1.RCE
2.BOF
3.POC
4.SQL Injection
5.Code Execution
6.Command Injection
7.Abritrary Library
phone Hacking
1.BOF
2.RCE
3.DOS
4.Bind RAT
5.spywere
server Hacking
1.BOF
2.RCE
3.SSRF
4.Zero Day
5.Privilage
6.Bruteforce
7.Upload Shell
8.SQL Injection
client Hacking
1.RAT
2.BOF
3.RCE
4.Virus
5.Binder
6.Cryption
7.Phishing
8.Backdoor
9.Keylogger
10.Privilage
11.Bruteforce
12.Steal Passwords
13.Social Engeenering
website Hacking
1.DOS
2.XSS
3.RCE
4.XXE
5.CSRF
6.SSRF
7.LFI/RFI
8.Cracking
9.Bruteforce
10.Upload Shell
11.SQL Injection
12.Google Hacking
13.Xpath Injection
14.BoF
network Hacking
1.BOF
2.RCE
3.VoIP
4.MITM
5.Spoof
6.Sniff
7.Bruteforce
8.Cupture Packet
#Wireless Hacking
1.WPSpin
2.FakeAP
3.Eviltwin
4.Handshake
5.mitm
6.evilgnix
reverse Engeenering
1.Compiler
2.Shellcode
3.App Cracking
4.Serial Cracking
5.Decompile Softwares
information Gathering
1.Enum
2.Recon
3.Whois
4.Email Contact
5.Phone Contact
6.Service Status
7.Protocol Analysis
8.doxerv2.0