Welcome To The Best list of  Hacking Tools in 2017


if you are reading this article I suspect that you are interested in becoming a hacker or you start to be.
To become a hacker is hard work because there is really no way to teach it. It takes about 3-5 years
to become a good hacker.

like i told you to become hacker can take time  and most of this time you will spend to master some hacking tools.

all these tools become from Linux distro’s like Kali Linux or Backbox so you have to install one of the this  Linux distro’s to make your hacking training easy.

In Here, You will see 10 important hacking tools you have to spend your time on it to become a good hacker :

nmap Nmap (Network Mapper) | Free

Used to Scan Ports and Map Networks – and a whole bunch more!

Nmap ( network mapper) is free and open source tool published by Gordon ‘Fyodor’ Lyon. http://nmap.org .
Nmap is mainly used for network discovery and security auditing, Nmap uses scan IP packet to determine what host are available on the network, what service running and version,what OS version (operation system), the existence of firewalls.
with The Nmap Scripting Engine (NSE) revolutionized the capabilities of Nmap you can have new features like brute-force account with a weak password, sniff networks, detect the latest SSL 3.0 vulnerability known as Poodle, even you can exploit vulnerabilities in popular software
Additionally, the Nmap Project includes other great tools:
Zenmap:  A graphical interface for Nmap.
Ndiff:        A tool for scan result comparison.
Nping:      An excellent tool for packet generation and traffic analysis.
Ncrack:    A Nmap-compatible tool for brute forcing network logins.
Ncat:         A debugging utility to read and write data across networks.


Metasploit Penetration Testing Software | Free & Paid

Vulnerability Exploitation Tool

Metasploit is a framework for the development and execution of exploits against a remote machine, it allows to carry out audits in safety, to test and to develop its own exploits. Originally created in Perl programming language, Metasploit Framework has been completely rewritten in Ruby language.
is often used by system administrators to test the vulnerabilities of computer systems to protect them, or by hackers for hacking purposes.
Metasploit contains many different types of payloads (more than 400 payloads) with more than 800 exploits for computers(windows/Linux mac), phones (android/ios/…), websites, webservers, and more…
there are a lot of different type of payloads (inlines/Staged/meterpreter/PassiveX/NoNX/Pv6/Reflective DLL injection…)


aircrack -ngAircrack-ng | Free

Password Cracking Tool

aircrack-ng is a suite of tools for WIFI is legendary because they are very powerful when used in the right hands.
Aircrack-ng can retrieve the WEP key once enough of encrypted packets have been captured.
The tool retrieves the WEP key using two main methods. The first via the PTW approach (Pyshkin, Tews, Weinmann) which makes the attack much faster compared to other WEP cracking tools. The second method is the FMS / Korek method. This method incorporates various statistical attacks to uncover the WEP key and use them in combination with the brute force.if you are a good hacker so you can crack WEP in few minutes but if you are professional  so you can get the WPA/WPA2.


jhon the ripper John The Ripper | Free

Password Cracking Tool

john the ripper or JTR  is one of the most powerful and popular password cracking pentesting tool . most poeple know the JTR is great with dictionary attacks, is take a .text file referred to as a ‘wordlist’, containing popular  and complex words found in a dictionary or real passwords cracked before and use it in the crack. john the ripper is ‘offline’ password cracker, is available for many flavors of Unix, Windows, DOS, and OpenVMS.

 

 


THC Hydra THC Hydra | Free

Password Cracking Tool
THC Hydra password cracking tool not like John The Ripper because when JTR is ‘offline’ Hydra is ‘Online’ tool , it is fast and stable Network hacking tool wiche use a brute-force attack or dictionary to try a diffrent passwords and login (username ) combination against a login page , THC Hydra is free tool and was tested to compile on Linux/Windows/ OpenBSD/Cygwin/Solaris and more…


wireshark1Wireshark | Free

Network scaner and analyzer

Wireshark is a free packet analyzer used in troubleshooting and analyzing computer networks, protocol development, education and reverse engineering. Wireshark uses the GTK + software library for the implementation of its user interface and pcap for packet capture; It runs on many UNIX-compliant environments such as GNU / Linux, FreeBSD, NetBSD, OpenBSD or Mac OSX, but also on Microsoft Windows.


maltegoMaltego | Free & Paid

Digital Forensics & informatin gathrenig

maltego is open-source software has used for forensics and information gathering, developed by Paterva, people start know maltego from kali Linux, you can be used for anybody( person or company ) and they will give you a lot of information about it and for more feature, you can buy the paid part,maltego also can start searching for a phone number, social media profile you can find all . because learning  information gathering is important to be a hacker so learning maltigo is a must.


 

niktoNikto Website Vulnerability Scanner | Free

Website Vulnerability Scanner Hacking Tool

Nikto  is another great hacking tool that many hackers like, Nikto is sponsored by Netsparker (which is yet another Hacking Tool that we have also listed in our directory), Nikto is an Open Source (GPL) web servers scanner which is able to scan and check web servers for vulnerabilities, including over 6700 potentially dangerous files/CGIs, It also checks for servers configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software.
Nikto is easy to use and great they give so is your hacking training you must learning this tool.

 

 

 


 

OWASP Zed | Free

Web Vulnerability Scanne

OWASP ZAP (short of Zed Attack Proxy) is open source web application scanner developed to find Vulnerability in web applications, OWASP become a very popular hacking tool, that’s because it’s easy to use and have many features, some of this features is FUZZER, WebSocket support, Intercepting proxy server AJAX web crawlers and more…
hacker like web application because is the window for many hacks, so if you love hacking websites so you have to master this tool.


armitagearmitage | Free

Vulnerability Exploitation Tool

Armitage is not a unique hacking tool is a graphic interface of Metasploit because many of people want to learn Metasploit but her interface is not easy to understand so that’s why Armitage can make the attack easy to understand so  I prefer to start using Armitage before Metasploit.