MERNIS98 π» 1. Nmap Network scanner used to discover hosts and services on a computer network. A must-have for reconnaissance. π οΈ 2. Metasploit Framework The go-to tool for exploitation. Launch exploits, write your own, and simulate real-world attacks. π‘ 3. Wireshark Powerful network protocol analyzer. Capture and inspect packets in real-time. π΅οΈββοΈ 4. Burp Suite A favorite for web application pentesting. Proxy, scanner, intruder, and repeater all-in-one. π 5. John the Ripper Legendary password cracker. Bruteforce or dictionary attacks made efficient. π 6. Hydra Fast and flexible login cracker supporting various protocols like FTP, SSH, HTTP. π 7. SQLMap Automates SQL injection and database takeover. Deadly in the wrong hands. π₯ 8. Aircrack-ng Suite of tools for auditing wireless networks. Crack WEP/WPA keys with captured packets. π‘οΈ 9. Snort Network intrusion detection and prevention system (IDS/IPS). π§ 10. Maltego Visual reconnaissance tool for open-source intelligence (OSINT) mapping relationships between data. π 11. Shodan The βsearch engine for hackers.β Find exposed devices and services on the internet. π 12. Netcat Swiss army knife of networking. Remote shells, port scans, data transfer β it does it all. πΈοΈ 13. Nikto Web server scanner to detect vulnerabilities and misconfigurations. π² 14. ApkTool Reverse engineer Android APK files. Modify, decompile, recompile. π¦ 15. Bettercap A modern, powerful, and flexible MITM attack tool. 𧬠16. Veil Payload obfuscation framework to bypass antivirus detection. π€ 17. Cobalt Strike Advanced threat emulation tool used by red teams and real attackers. π 18. Mimikatz Credential dumping tool. Extracts plaintext passwords, hashes, PINs from Windows systems. π°οΈ 19. SET (Social-Engineer Toolkit) Automate social engineering attacks like phishing, fake websites, and more. π¦ 20. BeEF (Browser Exploitation Framework) Hook web browsers and launch client-side attacks via JavaScript.