{"id":8442,"date":"2019-01-22T01:40:39","date_gmt":"2019-01-22T01:40:39","guid":{"rendered":"https:\/\/www.appservgrid.com\/paw92\/?p=8442"},"modified":"2019-03-09T07:07:40","modified_gmt":"2019-03-09T07:07:40","slug":"kali-linux-tools-listing-security-with-sources-urls-2019","status":"publish","type":"post","link":"https:\/\/www.appservgrid.com\/paw92\/index.php\/2019\/01\/22\/kali-linux-tools-listing-security-with-sources-urls-2019\/","title":{"rendered":"Kali Linux Tools Listing (Security with sources url&#8217;s) &#8211; 2019"},"content":{"rendered":"<h5><img decoding=\"async\" src=\"https:\/\/tools.kali.org\/wp-content\/uploads\/2015\/12\/tools-logo-1.png\" alt=\"Kali Linux Tools - Logo\" \/><\/h5>\n<h5>Information Gathering<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"ace-voip\" href=\"https:\/\/tools.kali.org\/information-gathering\/ace-voip\">ace-voip<\/a><\/li>\n<li><a title=\"Amap\" href=\"https:\/\/tools.kali.org\/information-gathering\/amap\">Amap<\/a><\/li>\n<li><a title=\"APT2\" href=\"https:\/\/tools.kali.org\/information-gathering\/apt2\">APT2<\/a><\/li>\n<li><a title=\"arp-scan\" href=\"https:\/\/tools.kali.org\/information-gathering\/arp-scan\">arp-scan<\/a><\/li>\n<li><a title=\"Automater\" href=\"https:\/\/tools.kali.org\/information-gathering\/automater\">Automater<\/a><\/li>\n<li><a title=\"bing-ip2hosts\" href=\"https:\/\/tools.kali.org\/information-gathering\/bing-ip2hosts\">bing-ip2hosts<\/a><\/li>\n<li><a title=\"braa\" href=\"https:\/\/tools.kali.org\/information-gathering\/braa\">braa<\/a><\/li>\n<li><a title=\"CaseFile\" href=\"https:\/\/tools.kali.org\/information-gathering\/casefile\">CaseFile<\/a><\/li>\n<li><a title=\"CDPSnarf\" href=\"https:\/\/tools.kali.org\/information-gathering\/cdpsnarf\">CDPSnarf<\/a><\/li>\n<li><a title=\"cisco-torch\" href=\"https:\/\/tools.kali.org\/information-gathering\/cisco-torch\">cisco-torch<\/a><\/li>\n<li><a title=\"copy-router-config\" href=\"https:\/\/tools.kali.org\/information-gathering\/copy-router-config\">copy-router-config<\/a><\/li>\n<li><a title=\"DMitry\" href=\"https:\/\/tools.kali.org\/information-gathering\/dmitry\">DMitry<\/a><\/li>\n<li><a title=\"dnmap\" href=\"https:\/\/tools.kali.org\/information-gathering\/dnmap\">dnmap<\/a><\/li>\n<li><a title=\"dnsenum\" href=\"https:\/\/tools.kali.org\/information-gathering\/dnsenum\">dnsenum<\/a><\/li>\n<li><a title=\"dnsmap\" href=\"https:\/\/tools.kali.org\/information-gathering\/dnsmap\">dnsmap<\/a><\/li>\n<li><a title=\"DNSRecon\" href=\"https:\/\/tools.kali.org\/information-gathering\/dnsrecon\">DNSRecon<\/a><\/li>\n<li><a title=\"dnstracer\" href=\"https:\/\/tools.kali.org\/information-gathering\/dnstracer\">dnstracer<\/a><\/li>\n<li><a title=\"dnswalk\" href=\"https:\/\/tools.kali.org\/information-gathering\/dnswalk\">dnswalk<\/a><\/li>\n<li><a title=\"DotDotPwn\" href=\"https:\/\/tools.kali.org\/information-gathering\/dotdotpwn\">DotDotPwn<\/a><\/li>\n<li><a title=\"enum4linux\" href=\"https:\/\/tools.kali.org\/information-gathering\/enum4linux\">enum4linux<\/a><\/li>\n<li><a title=\"enumIAX\" href=\"https:\/\/tools.kali.org\/information-gathering\/enumiax\">enumIAX<\/a><\/li>\n<li><a title=\"EyeWitness\" href=\"https:\/\/tools.kali.org\/information-gathering\/eyewitness\">EyeWitness<\/a><\/li>\n<li><a title=\"Faraday\" href=\"https:\/\/tools.kali.org\/information-gathering\/faraday\">Faraday<\/a><\/li>\n<li><a title=\"Fierce\" href=\"https:\/\/tools.kali.org\/information-gathering\/fierce\">Fierce<\/a><\/li>\n<li><a title=\"Firewalk\" href=\"https:\/\/tools.kali.org\/information-gathering\/firewalk\">Firewalk<\/a><\/li>\n<li><a title=\"fragroute\" href=\"https:\/\/tools.kali.org\/information-gathering\/fragroute\">fragroute<\/a><\/li>\n<li><a title=\"fragrouter\" href=\"https:\/\/tools.kali.org\/information-gathering\/fragrouter\">fragrouter<\/a><\/li>\n<li><a title=\"Ghost Phisher\" href=\"https:\/\/tools.kali.org\/information-gathering\/ghost-phisher\">Ghost Phisher<\/a><\/li>\n<li><a title=\"GoLismero\" href=\"https:\/\/tools.kali.org\/information-gathering\/golismero\">GoLismero<\/a><\/li>\n<li><a title=\"goofile\" href=\"https:\/\/tools.kali.org\/information-gathering\/goofile\">goofile<\/a><\/li>\n<li><a title=\"hping3\" href=\"https:\/\/tools.kali.org\/information-gathering\/hping3\">hping3<\/a><\/li>\n<li><a title=\"ident-user-enum\" href=\"https:\/\/tools.kali.org\/information-gathering\/ident-user-enum\">ident-user-enum<\/a><\/li>\n<li><a title=\"InSpy\" href=\"https:\/\/tools.kali.org\/information-gathering\/inspy\">InSpy<\/a><\/li>\n<li><a title=\"InTrace\" href=\"https:\/\/tools.kali.org\/information-gathering\/intrace\">InTrace<\/a><\/li>\n<li><a title=\"iSMTP\" href=\"https:\/\/tools.kali.org\/information-gathering\/ismtp\">iSMTP<\/a><\/li>\n<li><a title=\"lbd\" href=\"https:\/\/tools.kali.org\/information-gathering\/lbd\">lbd<\/a><\/li>\n<li><a title=\"Maltego Teeth\" href=\"https:\/\/tools.kali.org\/information-gathering\/maltego-teeth\">Maltego Teeth<\/a><\/li>\n<li><a title=\"masscan\" href=\"https:\/\/tools.kali.org\/information-gathering\/masscan\">masscan<\/a><\/li>\n<li><a title=\"Metagoofil\" href=\"https:\/\/tools.kali.org\/information-gathering\/metagoofil\">Metagoofil<\/a><\/li>\n<li><a title=\"Miranda\" href=\"https:\/\/tools.kali.org\/information-gathering\/miranda\">Miranda<\/a><\/li>\n<li><a title=\"nbtscan-unixwiz\" href=\"https:\/\/tools.kali.org\/information-gathering\/nbtscan-unixwiz\">nbtscan-unixwiz<\/a><\/li>\n<li><a title=\"Nikto\" href=\"https:\/\/tools.kali.org\/information-gathering\/nikto\">Nikto<\/a><\/li>\n<li><a title=\"Nmap\" href=\"https:\/\/tools.kali.org\/information-gathering\/nmap\">Nmap<\/a><\/li>\n<li><a title=\"ntop\" href=\"https:\/\/tools.kali.org\/information-gathering\/ntop\">ntop<\/a><\/li>\n<li><a title=\"OSRFramework\" href=\"https:\/\/tools.kali.org\/information-gathering\/osrframework\">OSRFramework<\/a><\/li>\n<li><a title=\"p0f\" href=\"https:\/\/tools.kali.org\/information-gathering\/p0f\">p0f<\/a><\/li>\n<li><a title=\"Parsero\" href=\"https:\/\/tools.kali.org\/information-gathering\/parsero\">Parsero<\/a><\/li>\n<li><a title=\"Recon-ng\" href=\"https:\/\/tools.kali.org\/information-gathering\/recon-ng\">Recon-ng<\/a><\/li>\n<li><a title=\"SET\" href=\"https:\/\/tools.kali.org\/information-gathering\/set\">SET<\/a><\/li>\n<li><a title=\"SMBMap\" href=\"https:\/\/tools.kali.org\/information-gathering\/smbmap\">SMBMap<\/a><\/li>\n<li><a title=\"smtp-user-enum\" href=\"https:\/\/tools.kali.org\/information-gathering\/smtp-user-enum\">smtp-user-enum<\/a><\/li>\n<li><a title=\"snmp-check\" href=\"https:\/\/tools.kali.org\/information-gathering\/snmp-check\">snmp-check<\/a><\/li>\n<li><a title=\"SPARTA\" href=\"https:\/\/tools.kali.org\/information-gathering\/sparta\">SPARTA<\/a><\/li>\n<li><a title=\"sslcaudit\" href=\"https:\/\/tools.kali.org\/information-gathering\/sslcaudit\">sslcaudit<\/a><\/li>\n<li><a title=\"SSLsplit\" href=\"https:\/\/tools.kali.org\/information-gathering\/sslsplit\">SSLsplit<\/a><\/li>\n<li><a title=\"sslstrip\" href=\"https:\/\/tools.kali.org\/information-gathering\/sslstrip\">sslstrip<\/a><\/li>\n<li><a title=\"SSLyze\" href=\"https:\/\/tools.kali.org\/information-gathering\/sslyze\">SSLyze<\/a><\/li>\n<li><a title=\"Sublist3r\" href=\"https:\/\/tools.kali.org\/information-gathering\/sublist3r\">Sublist3r<\/a><\/li>\n<li><a title=\"THC-IPV6\" href=\"https:\/\/tools.kali.org\/information-gathering\/thc-ipv6\">THC-IPV6<\/a><\/li>\n<li><a title=\"theHarvester\" href=\"https:\/\/tools.kali.org\/information-gathering\/theharvester\">theHarvester<\/a><\/li>\n<li><a title=\"TLSSLed\" href=\"https:\/\/tools.kali.org\/information-gathering\/tlssled\">TLSSLed<\/a><\/li>\n<li><a title=\"twofi\" href=\"https:\/\/tools.kali.org\/information-gathering\/twofi\">twofi<\/a><\/li>\n<li><a title=\"Unicornscan\" href=\"https:\/\/tools.kali.org\/information-gathering\/unicornscan\">Unicornscan<\/a><\/li>\n<li><a title=\"URLCrazy\" href=\"https:\/\/tools.kali.org\/information-gathering\/urlcrazy\">URLCrazy<\/a><\/li>\n<li><a title=\"Wireshark\" href=\"https:\/\/tools.kali.org\/information-gathering\/wireshark\">Wireshark<\/a><\/li>\n<li><a title=\"WOL-E\" href=\"https:\/\/tools.kali.org\/information-gathering\/wol-e\">WOL-E<\/a><\/li>\n<li><a title=\"Xplico\" href=\"https:\/\/tools.kali.org\/information-gathering\/xplico\">Xplico<\/a><\/li>\n<\/ul>\n<h5>Vulnerability Analysis<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"BBQSQL\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/bbqsql\">BBQSQL<\/a><\/li>\n<li><a title=\"BED\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/bed\">BED<\/a><\/li>\n<li><a title=\"cisco-auditing-tool\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/cisco-auditing-tool\">cisco-auditing-tool<\/a><\/li>\n<li><a title=\"cisco-global-exploiter\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/cisco-global-exploiter\">cisco-global-exploiter<\/a><\/li>\n<li><a title=\"cisco-ocs\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/cisco-ocs\">cisco-ocs<\/a><\/li>\n<li><a title=\"cisco-torch\" href=\"https:\/\/tools.kali.org\/information-gathering\/cisco-torch\">cisco-torch<\/a><\/li>\n<li><a title=\"copy-router-config\" href=\"https:\/\/tools.kali.org\/information-gathering\/copy-router-config\">copy-router-config<\/a><\/li>\n<li><a title=\"Doona\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/doona\">Doona<\/a><\/li>\n<li><a title=\"DotDotPwn\" href=\"https:\/\/tools.kali.org\/information-gathering\/dotdotpwn\">DotDotPwn<\/a><\/li>\n<li><a title=\"HexorBase\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/hexorbase\">HexorBase<\/a><\/li>\n<li><a title=\"jSQL Injection\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/jsql\">jSQL Injection<\/a><\/li>\n<li><a title=\"Lynis\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/lynis\">Lynis<\/a><\/li>\n<li><a title=\"Nmap\" href=\"https:\/\/tools.kali.org\/information-gathering\/nmap\">Nmap<\/a><\/li>\n<li><a title=\"ohrwurm\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/ohrwurm\">ohrwurm<\/a><\/li>\n<li><a title=\"openvas\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/openvas\">openvas<\/a><\/li>\n<li><a title=\"Oscanner\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/oscanner\">Oscanner<\/a><\/li>\n<li><a title=\"Powerfuzzer\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/powerfuzzer\">Powerfuzzer<\/a><\/li>\n<li><a title=\"sfuzz\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sfuzz\">sfuzz<\/a><\/li>\n<li><a title=\"SidGuesser\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sidguesser\">SidGuesser<\/a><\/li>\n<li><a title=\"SIPArmyKnife\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/siparmyknife\">SIPArmyKnife<\/a><\/li>\n<li><a title=\"sqlmap\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sqlmap\">sqlmap<\/a><\/li>\n<li><a title=\"Sqlninja\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sqlninja\">Sqlninja<\/a><\/li>\n<li><a title=\"sqlsus\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sqlsus\">sqlsus<\/a><\/li>\n<li><a title=\"THC-IPV6\" href=\"https:\/\/tools.kali.org\/information-gathering\/thc-ipv6\">THC-IPV6<\/a><\/li>\n<li><a title=\"tnscmd10g\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/tnscmd10g\">tnscmd10g<\/a><\/li>\n<li><a title=\"unix-privesc-check\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/unix-privesc-check\">unix-privesc-check<\/a><\/li>\n<li><a title=\"Yersinia\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/yersinia\">Yersinia<\/a><\/li>\n<\/ul>\n<h5>Exploitation Tools<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"Armitage\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/armitage\">Armitage<\/a><\/li>\n<li><a title=\"Backdoor Factory\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/backdoor-factory\">Backdoor Factory<\/a><\/li>\n<li><a title=\"BeEF\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/beef-xss\">BeEF<\/a><\/li>\n<li><a title=\"cisco-auditing-tool\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/cisco-auditing-tool\">cisco-auditing-tool<\/a><\/li>\n<li><a title=\"cisco-global-exploiter\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/cisco-global-exploiter\">cisco-global-exploiter<\/a><\/li>\n<li><a title=\"cisco-ocs\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/cisco-ocs\">cisco-ocs<\/a><\/li>\n<li><a title=\"cisco-torch\" href=\"https:\/\/tools.kali.org\/information-gathering\/cisco-torch\">cisco-torch<\/a><\/li>\n<li><a title=\"Commix\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/commix\">Commix<\/a><\/li>\n<li><a title=\"crackle\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/crackle\">crackle<\/a><\/li>\n<li><a title=\"exploitdb\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/exploitdb\">exploitdb<\/a><\/li>\n<li><a title=\"jboss-autopwn\" href=\"https:\/\/tools.kali.org\/web-applications\/jboss-autopwn\">jboss-autopwn<\/a><\/li>\n<li><a title=\"Linux Exploit Suggester\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/linux-exploit-suggester\">Linux Exploit Suggester<\/a><\/li>\n<li><a title=\"Maltego Teeth\" href=\"https:\/\/tools.kali.org\/information-gathering\/maltego-teeth\">Maltego Teeth<\/a><\/li>\n<li><a title=\"Metasploit Framework\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/metasploit-framework\">Metasploit Framework<\/a><\/li>\n<li><a title=\"MSFPC\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/msfpc\">MSFPC<\/a><\/li>\n<li><a title=\"RouterSploit\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/routersploit\">RouterSploit<\/a><\/li>\n<li><a title=\"SET\" href=\"https:\/\/tools.kali.org\/information-gathering\/set\">SET<\/a><\/li>\n<li><a title=\"ShellNoob\" href=\"https:\/\/tools.kali.org\/exploitation-tools\/shellnoob\">ShellNoob<\/a><\/li>\n<li><a title=\"sqlmap\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sqlmap\">sqlmap<\/a><\/li>\n<li><a title=\"THC-IPV6\" href=\"https:\/\/tools.kali.org\/information-gathering\/thc-ipv6\">THC-IPV6<\/a><\/li>\n<li><a title=\"Yersinia\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/yersinia\">Yersinia<\/a><\/li>\n<\/ul>\n<div class=\"vc_col-sm-3 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<h5>Wireless Attacks<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"Airbase-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airbase-ng\">Airbase-ng<\/a><\/li>\n<li><a title=\"Aircrack-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/aircrack-ng\">Aircrack-ng<\/a><\/li>\n<li><a title=\"Airdecap-ng and Airdecloak-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airdecap-ng-and-airdecloak-ng\">Airdecap-ng and Airdecloak-ng<\/a><\/li>\n<li><a title=\"Aireplay-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/aireplay-ng\">Aireplay-ng<\/a><\/li>\n<li><a title=\"airgraph-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airgraph-ng\">airgraph-ng<\/a><\/li>\n<li><a title=\"Airmon-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airmon-ng\">Airmon-ng<\/a><\/li>\n<li><a title=\"Airodump-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airodump-ng\">Airodump-ng<\/a><\/li>\n<li><a title=\"airodump-ng-oui-update\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airodump-ng-oui-update\">airodump-ng-oui-update<\/a><\/li>\n<li><a title=\"Airolib-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airolib-ng\">Airolib-ng<\/a><\/li>\n<li><a title=\"Airserv-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airserv-ng\">Airserv-ng<\/a><\/li>\n<li><a title=\"Airtun-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/airtun-ng\">Airtun-ng<\/a><\/li>\n<li><a title=\"Asleap\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/asleap\">Asleap<\/a><\/li>\n<li><a title=\"Besside-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/besside-ng\">Besside-ng<\/a><\/li>\n<li><a title=\"Bluelog\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/bluelog\">Bluelog<\/a><\/li>\n<li><a title=\"BlueMaho\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/bluemaho\">BlueMaho<\/a><\/li>\n<li><a title=\"Bluepot\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/bluepot\">Bluepot<\/a><\/li>\n<li><a title=\"BlueRanger\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/blueranger\">BlueRanger<\/a><\/li>\n<li><a title=\"Bluesnarfer\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/bluesnarfer\">Bluesnarfer<\/a><\/li>\n<li><a title=\"Bully\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/bully\">Bully<\/a><\/li>\n<li><a title=\"coWPAtty\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/cowpatty\">coWPAtty<\/a><\/li>\n<li><a title=\"crackle\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/crackle\">crackle<\/a><\/li>\n<li><a title=\"eapmd5pass\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/eapmd5pass\">eapmd5pass<\/a><\/li>\n<li><a title=\"Easside-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/easside-ng\">Easside-ng<\/a><\/li>\n<li><a title=\"Fern Wifi Cracker\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/fern-wifi-cracker\">Fern Wifi Cracker<\/a><\/li>\n<li><a title=\"FreeRADIUS-WPE\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/freeradius-wpe\">FreeRADIUS-WPE<\/a><\/li>\n<li><a title=\"Ghost Phisher\" href=\"https:\/\/tools.kali.org\/information-gathering\/ghost-phisher\">Ghost Phisher<\/a><\/li>\n<li><a title=\"GISKismet\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/giskismet\">GISKismet<\/a><\/li>\n<li><a title=\"Gqrx\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/gqrx\">Gqrx<\/a><\/li>\n<li><a title=\"gr-scan\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/gr-scan\">gr-scan<\/a><\/li>\n<li><a title=\"hostapd-wpe\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/hostapd-wpe\">hostapd-wpe<\/a><\/li>\n<li><a title=\"ivstools\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/ivstools\">ivstools<\/a><\/li>\n<li><a title=\"kalibrate-rtl\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/kalibrate-rtl\">kalibrate-rtl<\/a><\/li>\n<li><a title=\"KillerBee\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/killerbee\">KillerBee<\/a><\/li>\n<li><a title=\"Kismet\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/kismet\">Kismet<\/a><\/li>\n<li><a title=\"makeivs-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/makeivs-ng\">makeivs-ng<\/a><\/li>\n<li><a title=\"mdk3\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/mdk3\">mdk3<\/a><\/li>\n<li><a title=\"mfcuk\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/mfcuk\">mfcuk<\/a><\/li>\n<li><a title=\"mfoc\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/mfoc\">mfoc<\/a><\/li>\n<li><a title=\"mfterm\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/mfterm\">mfterm<\/a><\/li>\n<li><a title=\"Multimon-NG\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/multimon-ng\">Multimon-NG<\/a><\/li>\n<li><a title=\"Packetforge-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/packetforge-ng\">Packetforge-ng<\/a><\/li>\n<li><a title=\"PixieWPS\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/pixiewps\">PixieWPS<\/a><\/li>\n<li><a title=\"Pyrit\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/pyrit\">Pyrit<\/a><\/li>\n<li><a title=\"Reaver\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/reaver\">Reaver<\/a><\/li>\n<li><a title=\"redfang\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/redfang\">redfang<\/a><\/li>\n<li><a title=\"RTLSDR Scanner\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/rtlsdr-scanner\">RTLSDR Scanner<\/a><\/li>\n<li><a title=\"Spooftooph\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/spooftooph\">Spooftooph<\/a><\/li>\n<li><a title=\"Tkiptun-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/tkiptun-ng\">Tkiptun-ng<\/a><\/li>\n<li><a title=\"Wesside-ng\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/wesside-ng\">Wesside-ng<\/a><\/li>\n<li><a title=\"Wifi Honey\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/wifi-honey\">Wifi Honey<\/a><\/li>\n<li><a title=\"wifiphisher\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/wifiphisher\">wifiphisher<\/a><\/li>\n<li><a title=\"Wifitap\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/wifitap\">Wifitap<\/a><\/li>\n<li><a title=\"Wifite\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/wifite\">Wifite<\/a><\/li>\n<li><a title=\"wpaclean\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/wpaclean\">wpaclean<\/a><\/li>\n<\/ul>\n<h5>Forensics Tools<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"Binwalk\" href=\"https:\/\/tools.kali.org\/forensics\/binwalk\">Binwalk<\/a><\/li>\n<li><a title=\"bulk-extractor\" href=\"https:\/\/tools.kali.org\/forensics\/bulk-extractor\">bulk-extractor<\/a><\/li>\n<li><a title=\"Capstone\" href=\"https:\/\/tools.kali.org\/forensics\/capstone\">Capstone<\/a><\/li>\n<li><a title=\"chntpw\" href=\"https:\/\/tools.kali.org\/password-attacks\/chntpw\">chntpw<\/a><\/li>\n<li><a title=\"Cuckoo\" href=\"https:\/\/tools.kali.org\/forensics\/cuckoo\">Cuckoo<\/a><\/li>\n<li><a title=\"dc3dd\" href=\"https:\/\/tools.kali.org\/forensics\/dc3dd\">dc3dd<\/a><\/li>\n<li><a title=\"ddrescue\" href=\"https:\/\/tools.kali.org\/forensics\/ddrescue\">ddrescue<\/a><\/li>\n<li><a title=\"DFF\" href=\"https:\/\/tools.kali.org\/forensics\/dff\">DFF<\/a><\/li>\n<li><a title=\"diStorm3\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/distorm3\">diStorm3<\/a><\/li>\n<li><a title=\"Dumpzilla\" href=\"https:\/\/tools.kali.org\/forensics\/dumpzilla\">Dumpzilla<\/a><\/li>\n<li><a title=\"extundelete\" href=\"https:\/\/tools.kali.org\/forensics\/extundelete\">extundelete<\/a><\/li>\n<li><a title=\"Foremost\" href=\"https:\/\/tools.kali.org\/forensics\/foremost\">Foremost<\/a><\/li>\n<li><a title=\"Galleta\" href=\"https:\/\/tools.kali.org\/forensics\/galleta\">Galleta<\/a><\/li>\n<li><a title=\"Guymager\" href=\"https:\/\/tools.kali.org\/forensics\/guymager\">Guymager<\/a><\/li>\n<li><a title=\"iPhone Backup Analyzer\" href=\"https:\/\/tools.kali.org\/forensics\/iphone-backup-analyzer\">iPhone Backup Analyzer<\/a><\/li>\n<li><a title=\"p0f\" href=\"https:\/\/tools.kali.org\/information-gathering\/p0f\">p0f<\/a><\/li>\n<li><a title=\"pdf-parser\" href=\"https:\/\/tools.kali.org\/forensics\/pdf-parser\">pdf-parser<\/a><\/li>\n<li><a title=\"pdfid\" href=\"https:\/\/tools.kali.org\/forensics\/pdfid\">pdfid<\/a><\/li>\n<li><a title=\"pdgmail\" href=\"https:\/\/tools.kali.org\/forensics\/pdgmail\">pdgmail<\/a><\/li>\n<li><a title=\"peepdf\" href=\"https:\/\/tools.kali.org\/forensics\/peepdf\">peepdf<\/a><\/li>\n<li><a title=\"RegRipper\" href=\"https:\/\/tools.kali.org\/forensics\/regripper\">RegRipper<\/a><\/li>\n<li><a title=\"Volatility\" href=\"https:\/\/tools.kali.org\/forensics\/volatility\">Volatility<\/a><\/li>\n<li><a title=\"Xplico\" href=\"https:\/\/tools.kali.org\/information-gathering\/xplico\">Xplico<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-3 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<h5>Web Applications<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"apache-users\" href=\"https:\/\/tools.kali.org\/web-applications\/apache-users\">apache-users<\/a><\/li>\n<li><a title=\"Arachni\" href=\"https:\/\/tools.kali.org\/web-applications\/arachni\">Arachni<\/a><\/li>\n<li><a title=\"BBQSQL\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/bbqsql\">BBQSQL<\/a><\/li>\n<li><a title=\"BlindElephant\" href=\"https:\/\/tools.kali.org\/web-applications\/blindelephant\">BlindElephant<\/a><\/li>\n<li><a title=\"Burp Suite\" href=\"https:\/\/tools.kali.org\/web-applications\/burpsuite\">Burp Suite<\/a><\/li>\n<li><a title=\"CutyCapt\" href=\"https:\/\/tools.kali.org\/web-applications\/cutycapt\">CutyCapt<\/a><\/li>\n<li><a title=\"DAVTest\" href=\"https:\/\/tools.kali.org\/web-applications\/davtest\">DAVTest<\/a><\/li>\n<li><a title=\"deblaze\" href=\"https:\/\/tools.kali.org\/web-applications\/deblaze\">deblaze<\/a><\/li>\n<li><a title=\"DIRB\" href=\"https:\/\/tools.kali.org\/web-applications\/dirb\">DIRB<\/a><\/li>\n<li><a title=\"DirBuster\" href=\"https:\/\/tools.kali.org\/web-applications\/dirbuster\">DirBuster<\/a><\/li>\n<li><a title=\"fimap\" href=\"https:\/\/tools.kali.org\/web-applications\/fimap\">fimap<\/a><\/li>\n<li><a title=\"FunkLoad\" href=\"https:\/\/tools.kali.org\/web-applications\/funkload\">FunkLoad<\/a><\/li>\n<li><a title=\"Gobuster\" href=\"https:\/\/tools.kali.org\/web-applications\/gobuster\">Gobuster<\/a><\/li>\n<li><a title=\"Grabber\" href=\"https:\/\/tools.kali.org\/web-applications\/grabber\">Grabber<\/a><\/li>\n<li><a title=\"hURL\" href=\"https:\/\/tools.kali.org\/web-applications\/hurl\">hURL<\/a><\/li>\n<li><a title=\"jboss-autopwn\" href=\"https:\/\/tools.kali.org\/web-applications\/jboss-autopwn\">jboss-autopwn<\/a><\/li>\n<li><a title=\"joomscan\" href=\"https:\/\/tools.kali.org\/web-applications\/joomscan\">joomscan<\/a><\/li>\n<li><a title=\"jSQL Injection\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/jsql\">jSQL Injection<\/a><\/li>\n<li><a title=\"Maltego Teeth\" href=\"https:\/\/tools.kali.org\/information-gathering\/maltego-teeth\">Maltego Teeth<\/a><\/li>\n<li><a title=\"Nikto\" href=\"https:\/\/tools.kali.org\/information-gathering\/nikto\">Nikto<\/a><\/li>\n<li><a title=\"PadBuster\" href=\"https:\/\/tools.kali.org\/web-applications\/padbuster\">PadBuster<\/a><\/li>\n<li><a title=\"Paros\" href=\"https:\/\/tools.kali.org\/web-applications\/paros\">Paros<\/a><\/li>\n<li><a title=\"Parsero\" href=\"https:\/\/tools.kali.org\/information-gathering\/parsero\">Parsero<\/a><\/li>\n<li><a title=\"plecost\" href=\"https:\/\/tools.kali.org\/web-applications\/plecost\">plecost<\/a><\/li>\n<li><a title=\"Powerfuzzer\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/powerfuzzer\">Powerfuzzer<\/a><\/li>\n<li><a title=\"ProxyStrike\" href=\"https:\/\/tools.kali.org\/web-applications\/proxystrike\">ProxyStrike<\/a><\/li>\n<li><a title=\"Recon-ng\" href=\"https:\/\/tools.kali.org\/information-gathering\/recon-ng\">Recon-ng<\/a><\/li>\n<li><a title=\"Skipfish\" href=\"https:\/\/tools.kali.org\/web-applications\/skipfish\">Skipfish<\/a><\/li>\n<li><a title=\"sqlmap\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sqlmap\">sqlmap<\/a><\/li>\n<li><a title=\"Sqlninja\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sqlninja\">Sqlninja<\/a><\/li>\n<li><a title=\"sqlsus\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/sqlsus\">sqlsus<\/a><\/li>\n<li><a title=\"ua-tester\" href=\"https:\/\/tools.kali.org\/web-applications\/ua-tester\">ua-tester<\/a><\/li>\n<li><a title=\"Uniscan\" href=\"https:\/\/tools.kali.org\/web-applications\/uniscan\">Uniscan<\/a><\/li>\n<li><a title=\"w3af\" href=\"https:\/\/tools.kali.org\/web-applications\/w3af\">w3af<\/a><\/li>\n<li><a title=\"WebScarab\" href=\"https:\/\/tools.kali.org\/web-applications\/webscarab\">WebScarab<\/a><\/li>\n<li><a title=\"Webshag\" href=\"https:\/\/tools.kali.org\/web-applications\/webshag\">Webshag<\/a><\/li>\n<li><a title=\"WebSlayer\" href=\"https:\/\/tools.kali.org\/web-applications\/webslayer\">WebSlayer<\/a><\/li>\n<li><a title=\"WebSploit\" href=\"https:\/\/tools.kali.org\/web-applications\/websploit\">WebSploit<\/a><\/li>\n<li><a title=\"Wfuzz\" href=\"https:\/\/tools.kali.org\/web-applications\/wfuzz\">Wfuzz<\/a><\/li>\n<li><a title=\"WhatWeb\" href=\"https:\/\/tools.kali.org\/web-applications\/whatweb\">WhatWeb<\/a><\/li>\n<li><a title=\"WPScan\" href=\"https:\/\/tools.kali.org\/web-applications\/wpscan\">WPScan<\/a><\/li>\n<li><a title=\"XSSer\" href=\"https:\/\/tools.kali.org\/web-applications\/xsser\">XSSer<\/a><\/li>\n<li><a title=\"zaproxy\" href=\"https:\/\/tools.kali.org\/web-applications\/zaproxy\">zaproxy<\/a><\/li>\n<\/ul>\n<h5>Stress Testing<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"DHCPig\" href=\"https:\/\/tools.kali.org\/stress-testing\/dhcpig\">DHCPig<\/a><\/li>\n<li><a title=\"FunkLoad\" href=\"https:\/\/tools.kali.org\/web-applications\/funkload\">FunkLoad<\/a><\/li>\n<li><a title=\"iaxflood\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/iaxflood\">iaxflood<\/a><\/li>\n<li><a title=\"Inundator\" href=\"https:\/\/tools.kali.org\/stress-testing\/inundator\">Inundator<\/a><\/li>\n<li><a title=\"inviteflood\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/inviteflood\">inviteflood<\/a><\/li>\n<li><a title=\"ipv6-toolkit\" href=\"https:\/\/tools.kali.org\/stress-testing\/ipv6-toolkit\">ipv6-toolkit<\/a><\/li>\n<li><a title=\"mdk3\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/mdk3\">mdk3<\/a><\/li>\n<li><a title=\"Reaver\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/reaver\">Reaver<\/a><\/li>\n<li><a title=\"rtpflood\" href=\"https:\/\/tools.kali.org\/stress-testing\/rtpflood\">rtpflood<\/a><\/li>\n<li><a title=\"SlowHTTPTest\" href=\"https:\/\/tools.kali.org\/stress-testing\/slowhttptest\">SlowHTTPTest<\/a><\/li>\n<li><a title=\"t50\" href=\"https:\/\/tools.kali.org\/stress-testing\/t50\">t50<\/a><\/li>\n<li><a title=\"Termineter\" href=\"https:\/\/tools.kali.org\/stress-testing\/termineter\">Termineter<\/a><\/li>\n<li><a title=\"THC-IPV6\" href=\"https:\/\/tools.kali.org\/information-gathering\/thc-ipv6\">THC-IPV6<\/a><\/li>\n<li><a title=\"THC-SSL-DOS\" href=\"https:\/\/tools.kali.org\/stress-testing\/thc-ssl-dos\">THC-SSL-DOS<\/a><\/li>\n<\/ul>\n<h5>Sniffing &amp; Spoofing<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"bettercap\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/bettercap\">bettercap<\/a><\/li>\n<li><a title=\"Burp Suite\" href=\"https:\/\/tools.kali.org\/web-applications\/burpsuite\">Burp Suite<\/a><\/li>\n<li><a title=\"DNSChef\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/dnschef\">DNSChef<\/a><\/li>\n<li><a title=\"fiked\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/fiked\">fiked<\/a><\/li>\n<li><a title=\"hamster-sidejack\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/hamster-sidejack\">hamster-sidejack<\/a><\/li>\n<li><a title=\"HexInject\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/hexinject\">HexInject<\/a><\/li>\n<li><a title=\"iaxflood\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/iaxflood\">iaxflood<\/a><\/li>\n<li><a title=\"inviteflood\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/inviteflood\">inviteflood<\/a><\/li>\n<li><a title=\"iSMTP\" href=\"https:\/\/tools.kali.org\/information-gathering\/ismtp\">iSMTP<\/a><\/li>\n<li><a title=\"isr-evilgrade\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/isr-evilgrade\">isr-evilgrade<\/a><\/li>\n<li><a title=\"mitmproxy\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/mitmproxy\">mitmproxy<\/a><\/li>\n<li><a title=\"ohrwurm\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/ohrwurm\">ohrwurm<\/a><\/li>\n<li><a title=\"protos-sip\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/protos-sip\">protos-sip<\/a><\/li>\n<li><a title=\"rebind\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/rebind\">rebind<\/a><\/li>\n<li><a title=\"responder\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/responder\">responder<\/a><\/li>\n<li><a title=\"rtpbreak\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/rtpbreak\">rtpbreak<\/a><\/li>\n<li><a title=\"rtpinsertsound\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/rtpinsertsound\">rtpinsertsound<\/a><\/li>\n<li><a title=\"rtpmixsound\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/rtpmixsound\">rtpmixsound<\/a><\/li>\n<li><a title=\"sctpscan\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/sctpscan\">sctpscan<\/a><\/li>\n<li><a title=\"SIPArmyKnife\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/siparmyknife\">SIPArmyKnife<\/a><\/li>\n<li><a title=\"SIPp\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/sipp\">SIPp<\/a><\/li>\n<li><a title=\"SIPVicious\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/sipvicious\">SIPVicious<\/a><\/li>\n<li><a title=\"SniffJoke\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/sniffjoke\">SniffJoke<\/a><\/li>\n<li><a title=\"SSLsplit\" href=\"https:\/\/tools.kali.org\/information-gathering\/sslsplit\">SSLsplit<\/a><\/li>\n<li><a title=\"sslstrip\" href=\"https:\/\/tools.kali.org\/information-gathering\/sslstrip\">sslstrip<\/a><\/li>\n<li><a title=\"THC-IPV6\" href=\"https:\/\/tools.kali.org\/information-gathering\/thc-ipv6\">THC-IPV6<\/a><\/li>\n<li><a title=\"VoIPHopper\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/voiphopper\">VoIPHopper<\/a><\/li>\n<li><a title=\"WebScarab\" href=\"https:\/\/tools.kali.org\/web-applications\/webscarab\">WebScarab<\/a><\/li>\n<li><a title=\"Wifi Honey\" href=\"https:\/\/tools.kali.org\/wireless-attacks\/wifi-honey\">Wifi Honey<\/a><\/li>\n<li><a title=\"Wireshark\" href=\"https:\/\/tools.kali.org\/information-gathering\/wireshark\">Wireshark<\/a><\/li>\n<li><a title=\"xspy\" href=\"https:\/\/tools.kali.org\/sniffingspoofing\/xspy\">xspy<\/a><\/li>\n<li><a title=\"Yersinia\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/yersinia\">Yersinia<\/a><\/li>\n<li><a title=\"zaproxy\" href=\"https:\/\/tools.kali.org\/web-applications\/zaproxy\">zaproxy<\/a><\/li>\n<\/ul>\n<h5>Password Attacks<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"BruteSpray\" href=\"https:\/\/tools.kali.org\/password-attacks\/brutespray\">BruteSpray<\/a><\/li>\n<li><a title=\"Burp Suite\" href=\"https:\/\/tools.kali.org\/web-applications\/burpsuite\">Burp Suite<\/a><\/li>\n<li><a title=\"CeWL\" href=\"https:\/\/tools.kali.org\/password-attacks\/cewl\">CeWL<\/a><\/li>\n<li><a title=\"chntpw\" href=\"https:\/\/tools.kali.org\/password-attacks\/chntpw\">chntpw<\/a><\/li>\n<li><a title=\"cisco-auditing-tool\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/cisco-auditing-tool\">cisco-auditing-tool<\/a><\/li>\n<li><a title=\"CmosPwd\" href=\"https:\/\/tools.kali.org\/password-attacks\/cmospwd\">CmosPwd<\/a><\/li>\n<li><a title=\"creddump\" href=\"https:\/\/tools.kali.org\/password-attacks\/creddump\">creddump<\/a><\/li>\n<li><a title=\"crowbar\" href=\"https:\/\/tools.kali.org\/password-attacks\/crowbar\">crowbar<\/a><\/li>\n<li><a title=\"crunch\" href=\"https:\/\/tools.kali.org\/password-attacks\/crunch\">crunch<\/a><\/li>\n<li><a title=\"findmyhash\" href=\"https:\/\/tools.kali.org\/password-attacks\/findmyhash\">findmyhash<\/a><\/li>\n<li><a title=\"gpp-decrypt\" href=\"https:\/\/tools.kali.org\/password-attacks\/gpp-decrypt\">gpp-decrypt<\/a><\/li>\n<li><a title=\"hash-identifier\" href=\"https:\/\/tools.kali.org\/password-attacks\/hash-identifier\">hash-identifier<\/a><\/li>\n<li><a title=\"Hashcat\" href=\"https:\/\/tools.kali.org\/password-attacks\/hashcat\">Hashcat<\/a><\/li>\n<li><a title=\"HexorBase\" href=\"https:\/\/tools.kali.org\/vulnerability-analysis\/hexorbase\">HexorBase<\/a><\/li>\n<li><a title=\"THC-Hydra\" href=\"https:\/\/tools.kali.org\/password-attacks\/hydra\">THC-Hydra<\/a><\/li>\n<li><a title=\"John the Ripper\" href=\"https:\/\/tools.kali.org\/password-attacks\/john\">John the Ripper<\/a><\/li>\n<li><a title=\"Johnny\" href=\"https:\/\/tools.kali.org\/password-attacks\/johnny\">Johnny<\/a><\/li>\n<li><a title=\"keimpx\" href=\"https:\/\/tools.kali.org\/password-attacks\/keimpx\">keimpx<\/a><\/li>\n<li><a title=\"Maltego Teeth\" href=\"https:\/\/tools.kali.org\/information-gathering\/maltego-teeth\">Maltego Teeth<\/a><\/li>\n<li><a title=\"Maskprocessor\" href=\"https:\/\/tools.kali.org\/password-attacks\/maskprocessor\">Maskprocessor<\/a><\/li>\n<li><a title=\"multiforcer\" href=\"https:\/\/tools.kali.org\/password-attacks\/multiforcer\">multiforcer<\/a><\/li>\n<li><a title=\"Ncrack\" href=\"https:\/\/tools.kali.org\/password-attacks\/ncrack\">Ncrack<\/a><\/li>\n<li><a title=\"oclgausscrack\" href=\"https:\/\/tools.kali.org\/password-attacks\/oclgausscrack\">oclgausscrack<\/a><\/li>\n<li><a title=\"ophcrack\" href=\"https:\/\/tools.kali.org\/password-attacks\/ophcrack\">ophcrack<\/a><\/li>\n<li><a title=\"PACK\" href=\"https:\/\/tools.kali.org\/password-attacks\/pack\">PACK<\/a><\/li>\n<li><a title=\"patator\" href=\"https:\/\/tools.kali.org\/password-attacks\/patator\">patator<\/a><\/li>\n<li><a title=\"phrasendrescher\" href=\"https:\/\/tools.kali.org\/password-attacks\/phrasendrescher\">phrasendrescher<\/a><\/li>\n<li><a title=\"polenum\" href=\"https:\/\/tools.kali.org\/password-attacks\/polenum\">polenum<\/a><\/li>\n<li><a title=\"RainbowCrack\" href=\"https:\/\/tools.kali.org\/password-attacks\/rainbowcrack\">RainbowCrack<\/a><\/li>\n<li><a title=\"rcracki-mt\" href=\"https:\/\/tools.kali.org\/password-attacks\/rcracki-mt\">rcracki-mt<\/a><\/li>\n<li><a title=\"RSMangler\" href=\"https:\/\/tools.kali.org\/password-attacks\/rsmangler\">RSMangler<\/a><\/li>\n<li><a title=\"SecLists\" href=\"https:\/\/tools.kali.org\/password-attacks\/seclists\">SecLists<\/a><\/li>\n<li><a title=\"SQLdict\" href=\"https:\/\/tools.kali.org\/password-attacks\/sqldict\">SQLdict<\/a><\/li>\n<li><a title=\"Statsprocessor\" href=\"https:\/\/tools.kali.org\/password-attacks\/statsprocessor\">Statsprocessor<\/a><\/li>\n<li><a title=\"THC-pptp-bruter\" href=\"https:\/\/tools.kali.org\/password-attacks\/thc-pptp-bruter\">THC-pptp-bruter<\/a><\/li>\n<li><a title=\"TrueCrack\" href=\"https:\/\/tools.kali.org\/password-attacks\/truecrack\">TrueCrack<\/a><\/li>\n<li><a title=\"WebScarab\" href=\"https:\/\/tools.kali.org\/web-applications\/webscarab\">WebScarab<\/a><\/li>\n<li><a title=\"wordlists\" href=\"https:\/\/tools.kali.org\/password-attacks\/wordlists\">wordlists<\/a><\/li>\n<li><a title=\"zaproxy\" href=\"https:\/\/tools.kali.org\/web-applications\/zaproxy\">zaproxy<\/a><\/li>\n<\/ul>\n<h5>Maintaining Access<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"CryptCat\" href=\"https:\/\/tools.kali.org\/maintaining-access\/cryptcat\">CryptCat<\/a><\/li>\n<li><a title=\"Cymothoa\" href=\"https:\/\/tools.kali.org\/maintaining-access\/cymothoa\">Cymothoa<\/a><\/li>\n<li><a title=\"dbd\" href=\"https:\/\/tools.kali.org\/maintaining-access\/dbd\">dbd<\/a><\/li>\n<li><a title=\"dns2tcp\" href=\"https:\/\/tools.kali.org\/maintaining-access\/dns2tcp\">dns2tcp<\/a><\/li>\n<li><a title=\"HTTPTunnel\" href=\"https:\/\/tools.kali.org\/maintaining-access\/httptunnel\">HTTPTunnel<\/a><\/li>\n<li><a title=\"Intersect\" href=\"https:\/\/tools.kali.org\/maintaining-access\/intersect\">Intersect<\/a><\/li>\n<li><a title=\"Nishang\" href=\"https:\/\/tools.kali.org\/maintaining-access\/nishang\">Nishang<\/a><\/li>\n<li><a title=\"polenum\" href=\"https:\/\/tools.kali.org\/password-attacks\/polenum\">polenum<\/a><\/li>\n<li><a title=\"PowerSploit\" href=\"https:\/\/tools.kali.org\/maintaining-access\/powersploit\">PowerSploit<\/a><\/li>\n<li><a title=\"pwnat\" href=\"https:\/\/tools.kali.org\/maintaining-access\/pwnat\">pwnat<\/a><\/li>\n<li><a title=\"RidEnum\" href=\"https:\/\/tools.kali.org\/maintaining-access\/ridenum\">RidEnum<\/a><\/li>\n<li><a title=\"sbd\" href=\"https:\/\/tools.kali.org\/maintaining-access\/sbd\">sbd<\/a><\/li>\n<li><a title=\"shellter\" href=\"https:\/\/tools.kali.org\/maintaining-access\/shellter\">shellter<\/a><\/li>\n<li><a title=\"U3-Pwn\" href=\"https:\/\/tools.kali.org\/maintaining-access\/u3-pwn\">U3-Pwn<\/a><\/li>\n<li><a title=\"Webshells\" href=\"https:\/\/tools.kali.org\/maintaining-access\/webshells\">Webshells<\/a><\/li>\n<li><a title=\"Weevely\" href=\"https:\/\/tools.kali.org\/maintaining-access\/weevely\">Weevely<\/a><\/li>\n<li><a title=\"Winexe\" href=\"https:\/\/tools.kali.org\/maintaining-access\/winexe\">Winexe<\/a><\/li>\n<\/ul>\n<h5>Hardware Hacking<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"android-sdk\" href=\"https:\/\/tools.kali.org\/hardware-hacking\/android-sdk\">android-sdk<\/a><\/li>\n<li><a title=\"apktool\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/apktool\">apktool<\/a><\/li>\n<li><a title=\"Arduino\" href=\"https:\/\/tools.kali.org\/hardware-hacking\/arduino\">Arduino<\/a><\/li>\n<li><a title=\"dex2jar\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/dex2jar\">dex2jar<\/a><\/li>\n<li><a title=\"Sakis3G\" href=\"https:\/\/tools.kali.org\/hardware-hacking\/sakis3g\">Sakis3G<\/a><\/li>\n<li><a title=\"smali\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/smali\">smali<\/a><\/li>\n<\/ul>\n<h5>Reverse Engineering<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"apktool\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/apktool\">apktool<\/a><\/li>\n<li><a title=\"dex2jar\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/dex2jar\">dex2jar<\/a><\/li>\n<li><a title=\"diStorm3\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/distorm3\">diStorm3<\/a><\/li>\n<li><a title=\"edb-debugger\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/edb-debugger\">edb-debugger<\/a><\/li>\n<li><a title=\"jad\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/jad\">jad<\/a><\/li>\n<li><a title=\"javasnoop\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/javasnoop\">javasnoop<\/a><\/li>\n<li><a title=\"JD-GUI\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/jd-gui\">JD-GUI<\/a><\/li>\n<li><a title=\"OllyDbg\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/ollydbg\">OllyDbg<\/a><\/li>\n<li><a title=\"smali\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/smali\">smali<\/a><\/li>\n<li><a title=\"Valgrind\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/valgrind\">Valgrind<\/a><\/li>\n<li><a title=\"YARA\" href=\"https:\/\/tools.kali.org\/reverse-engineering\/yara\">YARA<\/a><\/li>\n<\/ul>\n<h5>Reporting Tools<\/h5>\n<hr \/>\n<p>&nbsp;<\/p>\n<ul id=\"lcp_instance_0\" class=\"lcp_catlist\">\n<li><a title=\"CaseFile\" href=\"https:\/\/tools.kali.org\/information-gathering\/casefile\">CaseFile<\/a><\/li>\n<li><a title=\"cherrytree\" href=\"https:\/\/tools.kali.org\/reporting-tools\/cherrytree\">cherrytree<\/a><\/li>\n<li><a title=\"CutyCapt\" href=\"https:\/\/tools.kali.org\/web-applications\/cutycapt\">CutyCapt<\/a><\/li>\n<li><a title=\"dos2unix\" href=\"https:\/\/tools.kali.org\/reporting-tools\/dos2unix\">dos2unix<\/a><\/li>\n<li><a title=\"Dradis\" href=\"https:\/\/tools.kali.org\/reporting-tools\/dradis\">Dradis<\/a><\/li>\n<li><a title=\"MagicTree\" href=\"https:\/\/tools.kali.org\/reporting-tools\/magictree\">MagicTree<\/a><\/li>\n<li><a title=\"Metagoofil\" href=\"https:\/\/tools.kali.org\/information-gathering\/metagoofil\">Metagoofil<\/a><\/li>\n<li><a title=\"Nipper-ng\" href=\"https:\/\/tools.kali.org\/reporting-tools\/nipper-ng\">Nipper-ng<\/a><\/li>\n<li><a title=\"pipal\" href=\"https:\/\/tools.kali.org\/reporting-tools\/pipal\">pipal<\/a><\/li>\n<li><a title=\"RDPY\" href=\"https:\/\/tools.kali.org\/reporting-tools\/rdpy\">RDPY<\/a><\/li>\n<\/ul>\n<h2>Kali Linux\u00a0Metapackages<\/h2>\n<p>Metapackages give you the flexibility to install specific subsets of tools based on your particular needs. For instance, if you are going to conduct a wireless security assessment, you can quickly\u00a0<a title=\"Custom Kali Linux ISO\" href=\"https:\/\/docs.kali.org\/downloading\/live-build-a-custom-kali-iso\" target=\"_blank\" rel=\"noopener\">create a custom Kali ISO<\/a>\u00a0and include the\u00a0<strong>kali-linux-wireless<\/strong>\u00a0metapackage to only install the tools you need.<\/p>\n<p>For more information, please refer to the original\u00a0<a title=\"Kali Linux Metapackages\" href=\"https:\/\/www.kali.org\/news\/kali-linux-metapackages\/\" target=\"_blank\" rel=\"noopener\">Kali Linux Metapackages<\/a>\u00a0blog post.<\/p>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux: The Base Kali Linux System<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-desktop-common<\/li>\n<li>apache2<\/li>\n<li>apt-transport-https<\/li>\n<li>atftpd<\/li>\n<li>axel<\/li>\n<li>default-mysql-server<\/li>\n<li>exe2hexbat<\/li>\n<li>expect<\/li>\n<li>florence<\/li>\n<li>gdisk<\/li>\n<li>git<\/li>\n<li>gparted<\/li>\n<li>iw<\/li>\n<li>lvm2<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>mercurial<\/li>\n<li>mlocate<\/li>\n<li>netcat-traditional<\/li>\n<li>openssh-server<\/li>\n<li>openvpn<\/li>\n<li>p7zip-full<\/li>\n<li>parted<\/li>\n<li>php<\/li>\n<li>php-mysql<\/li>\n<li>rdesktop<\/li>\n<li>rfkill<\/li>\n<li>samba<\/li>\n<li>screen<\/li>\n<li>snmp<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>snmpd<\/li>\n<li>subversion<\/li>\n<li>sudo<\/li>\n<li>tcpdump<\/li>\n<li>testdisk<\/li>\n<li>tftp<\/li>\n<li>tightvncserver<\/li>\n<li>tmux<\/li>\n<li>unrar | unar<\/li>\n<li>upx-ucl<\/li>\n<li>vim<\/li>\n<li>whois<\/li>\n<li>zerofree<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-full: The Default Kali Linux Install<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>0trace<\/li>\n<li>ace-voip<\/li>\n<li>afflib-tools<\/li>\n<li>aircrack-ng<\/li>\n<li>amap<\/li>\n<li>apache-users<\/li>\n<li>apktool<\/li>\n<li>armitage<\/li>\n<li>arp-scan<\/li>\n<li>arping | iputils-arping<\/li>\n<li>arpwatch<\/li>\n<li>asleap<\/li>\n<li>automater<\/li>\n<li>autopsy<\/li>\n<li>backdoor-factory<\/li>\n<li>bbqsql<\/li>\n<li>bdfproxy<\/li>\n<li>bed<\/li>\n<li>beef-xss<\/li>\n<li>binwalk<\/li>\n<li>blindelephant<\/li>\n<li>bluelog<\/li>\n<li>blueranger<\/li>\n<li>bluesnarfer<\/li>\n<li>bluez<\/li>\n<li>bluez-hcidump<\/li>\n<li>braa<\/li>\n<li>btscanner<\/li>\n<li>bulk-extractor<\/li>\n<li>bully<\/li>\n<li>burpsuite<\/li>\n<li>cabextract<\/li>\n<li>cadaver<\/li>\n<li>cdpsnarf<\/li>\n<li>cewl<\/li>\n<li>cgpt<\/li>\n<li>cherrytree<\/li>\n<li>chirp<\/li>\n<li>chkrootkit<\/li>\n<li>chntpw<\/li>\n<li>cisco-auditing-tool<\/li>\n<li>cisco-global-exploiter<\/li>\n<li>cisco-ocs<\/li>\n<li>cisco-torch<\/li>\n<li>clang<\/li>\n<li>clusterd<\/li>\n<li>cmospwd<\/li>\n<li>commix<\/li>\n<li>copy-router-config<\/li>\n<li>cowpatty<\/li>\n<li>creddump<\/li>\n<li>crunch<\/li>\n<li>cryptcat<\/li>\n<li>cryptsetup<\/li>\n<li>curlftpfs<\/li>\n<li>cutycapt<\/li>\n<li>cymothoa<\/li>\n<li>darkstat<\/li>\n<li>davtest<\/li>\n<li>dbd<\/li>\n<li>dc3dd<\/li>\n<li>dcfldd<\/li>\n<li>ddrescue<\/li>\n<li>deblaze<\/li>\n<li>dex2jar<\/li>\n<li>dhcpig<\/li>\n<li>dirb<\/li>\n<li>dirbuster<\/li>\n<li>dmitry<\/li>\n<li>dnmap<\/li>\n<li>dns2tcp<\/li>\n<li>dnschef<\/li>\n<li>dnsenum<\/li>\n<li>dnsmap<\/li>\n<li>dnsrecon<\/li>\n<li>dnstracer<\/li>\n<li>dnswalk<\/li>\n<li>doona<\/li>\n<li>dos2unix<\/li>\n<li>dotdotpwn<\/li>\n<li>dradis<\/li>\n<li>driftnet<\/li>\n<li>dsniff<\/li>\n<li>dumpzilla<\/li>\n<li>eapmd5pass<\/li>\n<li>edb-debugger<\/li>\n<li>enum4linux<\/li>\n<li>enumiax<\/li>\n<li>ethtool<\/li>\n<li>ettercap-graphical<\/li>\n<li>ewf-tools<\/li>\n<li>exiv2<\/li>\n<li>exploitdb<\/li>\n<li>extundelete<\/li>\n<li>fcrackzip<\/li>\n<li>fern-wifi-cracker<\/li>\n<li>ferret-sidejack<\/li>\n<li>fierce<\/li>\n<li>fiked<\/li>\n<li>fimap<\/li>\n<li>findmyhash<\/li>\n<li>flasm<\/li>\n<li>foremost<\/li>\n<li>fping<\/li>\n<li>fragroute<\/li>\n<li>fragrouter<\/li>\n<li>framework2<\/li>\n<li>ftester<\/li>\n<li>funkload<\/li>\n<li>galleta<\/li>\n<li>gdb<\/li>\n<li>ghost-phisher<\/li>\n<li>giskismet<\/li>\n<li>golismero<\/li>\n<li>gpp-decrypt<\/li>\n<li>grabber<\/li>\n<li>guymager<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>hackrf<\/li>\n<li>hamster-sidejack<\/li>\n<li>hash-identifier<\/li>\n<li>hashcat<\/li>\n<li>hashcat-utils<\/li>\n<li>hashdeep<\/li>\n<li>hashid<\/li>\n<li>hexinject<\/li>\n<li>hexorbase<\/li>\n<li>hotpatch<\/li>\n<li>hping3<\/li>\n<li>httrack<\/li>\n<li>hydra<\/li>\n<li>hydra-gtk<\/li>\n<li>i2c-tools<\/li>\n<li>iaxflood<\/li>\n<li>ifenslave<\/li>\n<li>ike-scan<\/li>\n<li>inetsim<\/li>\n<li>intersect<\/li>\n<li>intrace<\/li>\n<li>inviteflood<\/li>\n<li>iodine<\/li>\n<li>irpas<\/li>\n<li>jad<\/li>\n<li>javasnoop<\/li>\n<li>jboss-autopwn<\/li>\n<li>john<\/li>\n<li>johnny<\/li>\n<li>joomscan<\/li>\n<li>jsql-injection<\/li>\n<li>keimpx<\/li>\n<li>killerbee<\/li>\n<li>king-phisher<\/li>\n<li>kismet<\/li>\n<li>laudanum<\/li>\n<li>lbd<\/li>\n<li>leafpad<\/li>\n<li>libfindrtp<\/li>\n<li>libfreefare-bin<\/li>\n<li>libhivex-bin<\/li>\n<li>libnfc-bin<\/li>\n<li>lynis<\/li>\n<li>macchanger<\/li>\n<li>magicrescue<\/li>\n<li>magictree<\/li>\n<li>maltego<\/li>\n<li>maltego-teeth<\/li>\n<li>maskprocessor<\/li>\n<li>masscan<\/li>\n<li>mc<\/li>\n<li>mdbtools<\/li>\n<li>mdk3<\/li>\n<li>medusa<\/li>\n<li>memdump<\/li>\n<li>metasploit-framework<\/li>\n<li>mfcuk<\/li>\n<li>mfoc<\/li>\n<li>mfterm<\/li>\n<li>mimikatz<\/li>\n<li>minicom<\/li>\n<li>miranda<\/li>\n<li>miredo<\/li>\n<li>missidentify<\/li>\n<li>mitmproxy<\/li>\n<li>msfpc<\/li>\n<li>multimac<\/li>\n<li>nasm<\/li>\n<li>nbtscan<\/li>\n<li>ncat-w32<\/li>\n<li>ncrack<\/li>\n<li>ncurses-hexedit<\/li>\n<li>netdiscover<\/li>\n<li>netmask<\/li>\n<li>netsed<\/li>\n<li>netsniff-ng<\/li>\n<li>netwag<\/li>\n<li>nfspy<\/li>\n<li>ngrep<\/li>\n<li>nikto<\/li>\n<li>nipper-ng<\/li>\n<li>nishang<\/li>\n<li>nmap<\/li>\n<li>ohrwurm<\/li>\n<li>ollydbg<\/li>\n<li>onesixtyone<\/li>\n<li>ophcrack<\/li>\n<li>ophcrack-cli<\/li>\n<li>oscanner<\/li>\n<li>p0f<\/li>\n<li>pack<\/li>\n<li>padbuster<\/li>\n<li>paros<\/li>\n<li>pasco<\/li>\n<li>passing-the-hash<\/li>\n<li>patator<\/li>\n<li>pdf-parser<\/li>\n<li>pdfid<\/li>\n<li>pdgmail<\/li>\n<li>perl-cisco-copyconfig<\/li>\n<li>pev<\/li>\n<li>pipal<\/li>\n<li>pixiewps<\/li>\n<li>plecost<\/li>\n<li>polenum<\/li>\n<li>powerfuzzer<\/li>\n<li>powersploit<\/li>\n<li>protos-sip<\/li>\n<li>proxychains<\/li>\n<li>proxystrike<\/li>\n<li>proxytunnel<\/li>\n<li>pst-utils<\/li>\n<li>ptunnel<\/li>\n<li>pwnat<\/li>\n<li>pyrit<\/li>\n<li>python-faraday<\/li>\n<li>python-impacket<\/li>\n<li>python-peepdf<\/li>\n<li>python-rfidiot<\/li>\n<li>python-scapy<\/li>\n<li>radare2<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>rainbowcrack<\/li>\n<li>rake<\/li>\n<li>rcracki-mt<\/li>\n<li>reaver<\/li>\n<li>rebind<\/li>\n<li>recon-ng<\/li>\n<li>recordmydesktop<\/li>\n<li>recoverjpeg<\/li>\n<li>recstudio<\/li>\n<li>redfang<\/li>\n<li>redsocks<\/li>\n<li>reglookup<\/li>\n<li>regripper<\/li>\n<li>responder<\/li>\n<li>rifiuti<\/li>\n<li>rifiuti2<\/li>\n<li>rsmangler<\/li>\n<li>rtpbreak<\/li>\n<li>rtpflood<\/li>\n<li>rtpinsertsound<\/li>\n<li>rtpmixsound<\/li>\n<li>safecopy<\/li>\n<li>safecopy<\/li>\n<li>sakis3g<\/li>\n<li>samdump2<\/li>\n<li>sbd<\/li>\n<li>scalpel<\/li>\n<li>scrounge-ntfs<\/li>\n<li>sctpscan<\/li>\n<li>sendemail<\/li>\n<li>set<\/li>\n<li>sfuzz<\/li>\n<li>sidguesser<\/li>\n<li>siege<\/li>\n<li>siparmyknife<\/li>\n<li>sipcrack<\/li>\n<li>sipp<\/li>\n<li>sipvicious<\/li>\n<li>skipfish<\/li>\n<li>sleuthkit<\/li>\n<li>smali<\/li>\n<li>smbmap<\/li>\n<li>smtp-user-enum<\/li>\n<li>sniffjoke<\/li>\n<li>snmpcheck<\/li>\n<li>socat<\/li>\n<li>sparta<\/li>\n<li>spectools<\/li>\n<li>spike<\/li>\n<li>spooftooph<\/li>\n<li>sqldict<\/li>\n<li>sqlitebrowser<\/li>\n<li>sqlmap<\/li>\n<li>sqlninja<\/li>\n<li>sqlsus<\/li>\n<li>sslcaudit<\/li>\n<li>ssldump<\/li>\n<li>sslh<\/li>\n<li>sslscan<\/li>\n<li>sslsniff<\/li>\n<li>sslsplit<\/li>\n<li>sslstrip<\/li>\n<li>sslyze<\/li>\n<li>statsprocessor<\/li>\n<li>stunnel4<\/li>\n<li>suckless-tools<\/li>\n<li>sucrack<\/li>\n<li>swaks<\/li>\n<li>t50<\/li>\n<li>tcpflow<\/li>\n<li>tcpick<\/li>\n<li>tcpreplay<\/li>\n<li>termineter<\/li>\n<li>tftpd32<\/li>\n<li>thc-ipv6<\/li>\n<li>thc-pptp-bruter<\/li>\n<li>thc-ssl-dos<\/li>\n<li>theharvester<\/li>\n<li>tlssled<\/li>\n<li>tnscmd10g<\/li>\n<li>truecrack<\/li>\n<li>twofi<\/li>\n<li>u3-pwn<\/li>\n<li>ua-tester<\/li>\n<li>udptunnel<\/li>\n<li>unicornscan<\/li>\n<li>uniscan<\/li>\n<li>unix-privesc-check<\/li>\n<li>urlcrazy<\/li>\n<li>vboot-kernel-utils<\/li>\n<li>vboot-utils<\/li>\n<li>vim-gtk<\/li>\n<li>vinetto<\/li>\n<li>vlan<\/li>\n<li>voiphopper<\/li>\n<li>volafox<\/li>\n<li>volatility<\/li>\n<li>vpnc<\/li>\n<li>wafw00f<\/li>\n<li>wapiti<\/li>\n<li>wce<\/li>\n<li>webacoo<\/li>\n<li>webscarab<\/li>\n<li>webshells<\/li>\n<li>weevely<\/li>\n<li>wfuzz<\/li>\n<li>whatweb<\/li>\n<li>wifi-honey<\/li>\n<li>wifitap<\/li>\n<li>wifite<\/li>\n<li>windows-binaries<\/li>\n<li>winexe<\/li>\n<li>wireshark<\/li>\n<li>wol-e<\/li>\n<li>wordlists<\/li>\n<li>wpscan<\/li>\n<li>xpdf<\/li>\n<li>xprobe<\/li>\n<li>xspy<\/li>\n<li>xsser<\/li>\n<li>xtightvncviewer<\/li>\n<li>yersinia<\/li>\n<li>zaproxy<\/li>\n<li>zenmap<\/li>\n<li>zim<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-all: All Available Packages in Kali Linux<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux-forensic<\/li>\n<li>kali-linux-full<\/li>\n<li>kali-linux-gpu<\/li>\n<li>kali-linux-pwtools<\/li>\n<li>kali-linux-rfid<\/li>\n<li>kali-linux-sdr<\/li>\n<li>kali-linux-top10<\/li>\n<li>kali-linux-voip<\/li>\n<li>kali-linux-web<\/li>\n<li>kali-linux-wireless<\/li>\n<li>android-sdk<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>device-pharmer<\/li>\n<li>freeradius<\/li>\n<li>hackersh<\/li>\n<li>htshells<\/li>\n<li>ident-user-enum<\/li>\n<li>ismtp<\/li>\n<li>linux-exploit-suggester<\/li>\n<li>openvas<\/li>\n<li>parsero<\/li>\n<li>python-halberd<\/li>\n<li>sandi<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>set<\/li>\n<li>shellnoob<\/li>\n<li>shellter<\/li>\n<li>teamsploit<\/li>\n<li>vega<\/li>\n<li>veil<\/li>\n<li>webhandler<\/li>\n<li>websploit<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-sdr: Software Defined Radio (SDR) Tools in Kali<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>chirp<\/li>\n<li>gnuradio<\/li>\n<li>gqrx-sdr<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>gr-iqbal<\/li>\n<li>gr-osmosdr<\/li>\n<li>hackrf<\/li>\n<li>kalibrate-rtl<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>libgnuradio-baz<\/li>\n<li>multimon-ng<\/li>\n<li>rtlsdr-scanner<\/li>\n<li>uhd-host<\/li>\n<li>uhd-images<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-gpu: Kali Linux GPU-Powered Tools<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>oclgausscrack<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>oclhashcat<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>pyrit<\/li>\n<li>truecrack<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-wireless: Wireless Tools in Kali<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>kali-linux-sdr<\/li>\n<li>aircrack-ng<\/li>\n<li>asleap<\/li>\n<li>bluelog<\/li>\n<li>blueranger<\/li>\n<li>bluesnarfer<\/li>\n<li>bluez<\/li>\n<li>bluez-hcidump<\/li>\n<li>btscanner<\/li>\n<li>bully<\/li>\n<li>cowpatty<\/li>\n<li>crackle<\/li>\n<li>eapmd5pass<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>fern-wifi-cracker<\/li>\n<li>giskismet<\/li>\n<li>iw<\/li>\n<li>killerbee<\/li>\n<li>kismet<\/li>\n<li>libfreefare-bin<\/li>\n<li>libnfc-bin<\/li>\n<li>macchanger<\/li>\n<li>mdk3<\/li>\n<li>mfcuk<\/li>\n<li>mfoc<\/li>\n<li>mfterm<\/li>\n<li>oclhashcat<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>pyrit<\/li>\n<li>python-rfidiot<\/li>\n<li>reaver<\/li>\n<li>redfang<\/li>\n<li>rfcat<\/li>\n<li>rfkill<\/li>\n<li>sakis3g<\/li>\n<li>spectools<\/li>\n<li>spooftooph<\/li>\n<li>ubertooth<\/li>\n<li>wifi-honey<\/li>\n<li>wifitap<\/li>\n<li>wifite<\/li>\n<li>wireshark<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-web: Kali Linux Web-App Assessment Tools<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>apache-users<\/li>\n<li>apache2<\/li>\n<li>arachni<\/li>\n<li>automater<\/li>\n<li>bbqsql<\/li>\n<li>beef-xss<\/li>\n<li>blindelephant<\/li>\n<li>burpsuite<\/li>\n<li>cadaver<\/li>\n<li>clusterd<\/li>\n<li>cookie-cadger<\/li>\n<li>cutycapt<\/li>\n<li>davtest<\/li>\n<li>default-mysql-server<\/li>\n<li>dirb<\/li>\n<li>dirbuster<\/li>\n<li>dnmap<\/li>\n<li>dotdotpwn<\/li>\n<li>eyewitness<\/li>\n<li>ferret-sidejack<\/li>\n<li>ftester<\/li>\n<li>funkload<\/li>\n<li>golismero<\/li>\n<li>grabber<\/li>\n<li>hamster-sidejack<\/li>\n<li>hexorbase<\/li>\n<li>httprint<\/li>\n<li>httrack<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>hydra<\/li>\n<li>hydra-gtk<\/li>\n<li>jboss-autopwn<\/li>\n<li>joomscan<\/li>\n<li>jsql-injection<\/li>\n<li>laudanum<\/li>\n<li>lbd<\/li>\n<li>maltego<\/li>\n<li>maltego-teeth<\/li>\n<li>medusa<\/li>\n<li>mitmproxy<\/li>\n<li>ncrack<\/li>\n<li>nikto<\/li>\n<li>nishang<\/li>\n<li>nmap<\/li>\n<li>oscanner<\/li>\n<li>owasp-mantra-ff<\/li>\n<li>padbuster<\/li>\n<li>paros<\/li>\n<li>patator<\/li>\n<li>php<\/li>\n<li>php-mysql<\/li>\n<li>plecost<\/li>\n<li>powerfuzzer<\/li>\n<li>proxychains<\/li>\n<li>proxystrike<\/li>\n<li>proxytunnel<\/li>\n<li>python-halberd<\/li>\n<li>redsocks<\/li>\n<li>sidguesser<\/li>\n<li>siege<\/li>\n<li>skipfish<\/li>\n<li>slowhttptest<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>sqldict<\/li>\n<li>sqlitebrowser<\/li>\n<li>sqlmap<\/li>\n<li>sqlninja<\/li>\n<li>sqlsus<\/li>\n<li>sslcaudit<\/li>\n<li>ssldump<\/li>\n<li>sslh<\/li>\n<li>sslscan<\/li>\n<li>sslsniff<\/li>\n<li>sslsplit<\/li>\n<li>sslstrip<\/li>\n<li>sslyze<\/li>\n<li>stunnel4<\/li>\n<li>thc-ssl-dos<\/li>\n<li>tlssled<\/li>\n<li>tnscmd10g<\/li>\n<li>ua-tester<\/li>\n<li>uniscan<\/li>\n<li>vega<\/li>\n<li>wafw00f<\/li>\n<li>wapiti<\/li>\n<li>webacoo<\/li>\n<li>webhandler<\/li>\n<li>webscarab<\/li>\n<li>webshells<\/li>\n<li>weevely<\/li>\n<li>wfuzz<\/li>\n<li>whatweb<\/li>\n<li>wireshark<\/li>\n<li>wpscan<\/li>\n<li>xsser<\/li>\n<li>zaproxy<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-forensic: Kali Linux Forensic Tools<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>afflib-tools<\/li>\n<li>apktool<\/li>\n<li>autopsy<\/li>\n<li>bulk-extractor<\/li>\n<li>cabextract<\/li>\n<li>chkrootkit<\/li>\n<li>creddump<\/li>\n<li>dc3dd<\/li>\n<li>dcfldd<\/li>\n<li>ddrescue<\/li>\n<li>dumpzilla<\/li>\n<li>edb-debugger<\/li>\n<li>ewf-tools<\/li>\n<li>exiv2<\/li>\n<li>extundelete<\/li>\n<li>fcrackzip<\/li>\n<li>firmware-mod-kit<\/li>\n<li>flasm<\/li>\n<li>foremost<\/li>\n<li>galleta<\/li>\n<li>gdb<\/li>\n<li>gparted<\/li>\n<li>guymager<\/li>\n<li>hashdeep<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>inetsim<\/li>\n<li>iphone-backup-analyzer<\/li>\n<li>jad<\/li>\n<li>javasnoop<\/li>\n<li>libhivex-bin<\/li>\n<li>lvm2<\/li>\n<li>lynis<\/li>\n<li>magicrescue<\/li>\n<li>mdbtools<\/li>\n<li>memdump<\/li>\n<li>missidentify<\/li>\n<li>nasm<\/li>\n<li>ollydbg<\/li>\n<li>p7zip-full<\/li>\n<li>parted<\/li>\n<li>pasco<\/li>\n<li>pdf-parser<\/li>\n<li>pdfid<\/li>\n<li>pdgmail<\/li>\n<li>pev<\/li>\n<li>polenum<\/li>\n<li>pst-utils<\/li>\n<li>python-capstone<\/li>\n<li>python-distorm3<\/li>\n<li>python-peepdf<\/li>\n<li>radare2<\/li>\n<li>recoverjpeg<\/li>\n<li>recstudio<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>reglookup<\/li>\n<li>regripper<\/li>\n<li>rifiuti<\/li>\n<li>rifiuti2<\/li>\n<li>safecopy<\/li>\n<li>safecopy<\/li>\n<li>samdump2<\/li>\n<li>scalpel<\/li>\n<li>scrounge-ntfs<\/li>\n<li>sleuthkit<\/li>\n<li>smali<\/li>\n<li>sqlitebrowser<\/li>\n<li>tcpdump<\/li>\n<li>tcpflow<\/li>\n<li>tcpick<\/li>\n<li>tcpreplay<\/li>\n<li>truecrack<\/li>\n<li>unrar | unar<\/li>\n<li>upx-ucl<\/li>\n<li>vinetto<\/li>\n<li>volafox<\/li>\n<li>volatility<\/li>\n<li>wce<\/li>\n<li>wireshark<\/li>\n<li>xplico<\/li>\n<li>yara<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-voip: Kali Linux VoIP Tools<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>ace-voip<\/li>\n<li>dnmap<\/li>\n<li>enumiax<\/li>\n<li>iaxflood<\/li>\n<li>inviteflood<\/li>\n<li>libfindrtp<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>nmap<\/li>\n<li>ohrwurm<\/li>\n<li>protos-sip<\/li>\n<li>rtpbreak<\/li>\n<li>rtpflood<\/li>\n<li>rtpinsertsound<\/li>\n<li>rtpmixsound<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>sctpscan<\/li>\n<li>siparmyknife<\/li>\n<li>sipcrack<\/li>\n<li>sipp<\/li>\n<li>sipvicious<\/li>\n<li>voiphopper<\/li>\n<li>wireshark<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-pwtools: Kali Linux Password Cracking Tools<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>kali-linux-gpu<\/li>\n<li>chntpw<\/li>\n<li>cmospwd<\/li>\n<li>crunch<\/li>\n<li>fcrackzip<\/li>\n<li>findmyhash<\/li>\n<li>gpp-decrypt<\/li>\n<li>hash-identifier<\/li>\n<li>hashcat<\/li>\n<li>hashcat-utils<\/li>\n<li>hashid<\/li>\n<li>hydra<\/li>\n<li>hydra-gtk<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>john<\/li>\n<li>johnny<\/li>\n<li>keimpx<\/li>\n<li>maskprocessor<\/li>\n<li>medusa<\/li>\n<li>mimikatz<\/li>\n<li>ncrack<\/li>\n<li>ophcrack<\/li>\n<li>ophcrack-cli<\/li>\n<li>pack<\/li>\n<li>passing-the-hash<\/li>\n<li>patator<\/li>\n<li>pdfcrack<\/li>\n<li>pipal<\/li>\n<li>polenum<\/li>\n<li>rainbowcrack<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>rarcrack<\/li>\n<li>rcracki-mt<\/li>\n<li>rsmangler<\/li>\n<li>samdump2<\/li>\n<li>seclists<\/li>\n<li>sipcrack<\/li>\n<li>sipvicious<\/li>\n<li>sqldict<\/li>\n<li>statsprocessor<\/li>\n<li>sucrack<\/li>\n<li>thc-pptp-bruter<\/li>\n<li>truecrack<\/li>\n<li>twofi<\/li>\n<li>wce<\/li>\n<li>wordlists<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-top10: Top 10 Kali Linux Tools<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>aircrack-ng<\/li>\n<li>burpsuite<\/li>\n<li>hydra<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>john<\/li>\n<li>maltego<\/li>\n<li>maltego-teeth<\/li>\n<li>metasploit-framework<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>nmap<\/li>\n<li>sqlmap<\/li>\n<li>wireshark<\/li>\n<li>zaproxy<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-rfid: Kali Linux RFID Tools<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-linux<\/li>\n<li>libfreefare-bin<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>libnfc-bin<\/li>\n<li>mfcuk<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>mfoc<\/li>\n<li>mfterm<\/li>\n<li>python-rfidiot<\/li>\n<\/ul>\n<div class=\"w-tabs-section-header\">\n<div class=\"w-tabs-section-header-h\">\n<div class=\"w-tabs-section-title\"><strong>kali-linux-nethunter: Kali Linux NetHunters Default Tools<\/strong><\/div>\n<div class=\"w-tabs-section-control\"><\/div>\n<\/div>\n<\/div>\n<div class=\"w-tabs-section-content\">\n<div class=\"w-tabs-section-content-h i-cf\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner \">\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kali-defaults<\/li>\n<li>kali-root-login<\/li>\n<li>aircrack-ng<\/li>\n<li>apache2<\/li>\n<li>armitage<\/li>\n<li>autossh<\/li>\n<li>backdoor-factory<\/li>\n<li>bdfproxy<\/li>\n<li>beef-xss<\/li>\n<li>burpsuite<\/li>\n<li>dbd<\/li>\n<li>desktop-base<\/li>\n<li>device-pharmer<\/li>\n<li>dnsmasq<\/li>\n<li>dnsutils<\/li>\n<li>dsniff<\/li>\n<li>ettercap-text-only<\/li>\n<li>exploitdb<\/li>\n<li>florence<\/li>\n<li>giskismet<\/li>\n<li>gpsd<\/li>\n<li>hostapd<\/li>\n<li>isc-dhcp-server<\/li>\n<li>iw<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>kismet<\/li>\n<li>kismet-plugins<\/li>\n<li>libffi-dev<\/li>\n<li>librtlsdr-dev<\/li>\n<li>libssl-dev<\/li>\n<li>macchanger<\/li>\n<li>mdk3<\/li>\n<li>metasploit-framework<\/li>\n<li>mfoc<\/li>\n<li>mitmf<\/li>\n<li>mitmproxy<\/li>\n<li>nethunter-utils<\/li>\n<li>nishang<\/li>\n<li>nmap<\/li>\n<li>openssh-server<\/li>\n<li>openvpn<\/li>\n<li>p0f<\/li>\n<li>php<\/li>\n<li>pixiewps<\/li>\n<li>postgresql<\/li>\n<li>ptunnel<\/li>\n<li>python-dnspython<\/li>\n<li>python-lxml<\/li>\n<li>python-m2crypto<\/li>\n<li>python-mako<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vc_col-sm-4 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column \">\n<div class=\"wpb_wrapper\">\n<ul>\n<li>python-netaddr<\/li>\n<li>python-pcapy<\/li>\n<li>python-pip<\/li>\n<li>python-setuptools<\/li>\n<li>python-twisted<\/li>\n<li>recon-ng<\/li>\n<li>rfkill<\/li>\n<li>socat<\/li>\n<li>sox<\/li>\n<li>sqlmap<\/li>\n<li>sslsplit<\/li>\n<li>sslstrip<\/li>\n<li>tcpdump<\/li>\n<li>tcptrace<\/li>\n<li>tightvncserver<\/li>\n<li>tinyproxy<\/li>\n<li>tshark<\/li>\n<li>wifite<\/li>\n<li>wipe<\/li>\n<li>wireshark<\/li>\n<li>wpasupplicant<\/li>\n<li>xfce4<\/li>\n<li>xfce4-goodies<\/li>\n<li>xfce4-places-plugin<\/li>\n<li>zip<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/tools.kali.org\/\" target=\"_blank\" rel=\"noopener\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Gathering &nbsp; ace-voip Amap APT2 arp-scan Automater bing-ip2hosts braa CaseFile CDPSnarf cisco-torch copy-router-config DMitry dnmap dnsenum dnsmap DNSRecon dnstracer dnswalk DotDotPwn enum4linux enumIAX EyeWitness Faraday Fierce Firewalk fragroute fragrouter Ghost Phisher GoLismero goofile hping3 ident-user-enum InSpy InTrace iSMTP lbd Maltego Teeth masscan Metagoofil Miranda nbtscan-unixwiz Nikto Nmap ntop OSRFramework p0f Parsero Recon-ng SET SMBMap &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.appservgrid.com\/paw92\/index.php\/2019\/01\/22\/kali-linux-tools-listing-security-with-sources-urls-2019\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kali Linux Tools Listing (Security with sources url&#8217;s) &#8211; 2019&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8442","post","type-post","status-publish","format-standard","hentry","category-linux"],"_links":{"self":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/8442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/comments?post=8442"}],"version-history":[{"count":2,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/8442\/revisions"}],"predecessor-version":[{"id":10976,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/posts\/8442\/revisions\/10976"}],"wp:attachment":[{"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/media?parent=8442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/categories?post=8442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.appservgrid.com\/paw92\/index.php\/wp-json\/wp\/v2\/tags?post=8442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}