{"id":959,"date":"2023-06-19T07:25:28","date_gmt":"2023-06-19T07:25:28","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=959"},"modified":"2023-06-19T07:25:28","modified_gmt":"2023-06-19T07:25:28","slug":"all-in-one-hacking-tools-for-pen-testers-and-cyber-security-researchers","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=959","title":{"rendered":"All in one Hacking tools for Pen testers and Cyber Security Researchers."},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D959\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=959&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><h2 dir=\"auto\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-960\" src=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.17.58-300x164.png\" alt=\"\" width=\"675\" height=\"369\" srcset=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.17.58-300x164.png 300w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.17.58-1024x559.png 1024w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.17.58-768x419.png 768w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.17.58.png 1532w\" sizes=\"(max-width: 675px) 100vw, 675px\" \/><\/h2>\n<h2 dir=\"auto\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-961\" src=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.27-300x162.png\" alt=\"\" width=\"652\" height=\"352\" srcset=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.27-300x162.png 300w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.27-1024x552.png 1024w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.27-768x414.png 768w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.27.png 1514w\" sizes=\"(max-width: 652px) 100vw, 652px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-962\" src=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.40-300x161.png\" alt=\"\" width=\"676\" height=\"363\" srcset=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.40-300x161.png 300w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.40-1024x548.png 1024w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.40-768x411.png 768w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.40.png 1532w\" sizes=\"(max-width: 676px) 100vw, 676px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-963\" src=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.46-300x161.png\" alt=\"\" width=\"673\" height=\"361\" srcset=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.46-300x161.png 300w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.46-1024x549.png 1024w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.46-768x412.png 768w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.46.png 1530w\" sizes=\"(max-width: 673px) 100vw, 673px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-964\" src=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.54-300x164.png\" alt=\"\" width=\"673\" height=\"368\" srcset=\"https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.54-300x164.png 300w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.54-1024x560.png 1024w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.54-768x420.png 768w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.54-1536x841.png 1536w, https:\/\/cybersecuritynest.com\/wp-content\/uploads\/2023\/06\/Screenshot-2023-06-19-at-08.19.54.png 1546w\" sizes=\"(max-width: 673px) 100vw, 673px\" \/><\/h2>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#anonymously-hiding-tools\">Anonymously Hiding Tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#information-gathering-tools\">Information gathering tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#wordlist-generator\">Wordlist Generator<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#wireless-attack-tools\">Wireless attack tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#sql-injection-tools\">SQL Injection Tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#phishing-attack-tools\">Phishing attack tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#web-attack-tools\">Web Attack tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#post-exploitation-tools\">Post exploitation tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#forensic-tools\">Forensic tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#payload-creation-tools\">Payload creation tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#exploit-framework\">Exploit framework<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#reverse-engineering-tools\">Reverse engineering tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#ddos-attack-tools\">DDOS Attack Tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#remote-administrator-tools--rat-\">Remote Administrator Tools (RAT)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#xss-attack-tools\">XSS Attack Tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#steganograhy-tools\">Steganograhy tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#other-tools\">Other tools<\/a>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#socialmedia-bruteforce\">SocialMedia Bruteforce<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#android-hacking-tools\">Android Hacking tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#idn-homograph-attack\">IDN Homograph Attack<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#email-verify-tools\">Email Verify tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#hash-cracking-tools\">Hash cracking tools<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#wifi-deauthenticate\">Wifi Deauthenticate<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#socialmedia-finder\">SocialMedia Finder<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#payload-injector\">Payload Injector<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#web-crawling\">Web crawling<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/hackingtool#mix-tools\">Mix tools<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-anonymously-hiding-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#anonymously-hiding-tools\" aria-hidden=\"true\"><\/a>Anonymously Hiding Tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/Und3rf10w\/kali-anonsurf\">Anonmously Surf<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/trimstray\/multitor\">Multitor<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-information-gathering-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#information-gathering-tools\" aria-hidden=\"true\"><\/a>Information gathering tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/nmap\/nmap\">Network Map (nmap)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Screetsec\/Dracnmap\">Dracnmap<\/a><\/li>\n<li>Port scanning<\/li>\n<li>Host to IP<\/li>\n<li><a href=\"https:\/\/github.com\/LionSec\/xerosploit\">Xerosploit<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Tuhinshubhra\/RED_HAWK\">RED HAWK (All In One Scanning)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/bhavsec\/reconspider\">ReconSpider(For All Scanning)<\/a><\/li>\n<li>IsItDown (Check Website Down\/Up)<\/li>\n<li><a href=\"https:\/\/github.com\/m4ll0k\/Infoga\">Infoga &#8211; Email OSINT<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/s0md3v\/ReconDog\">ReconDog<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/s0md3v\/Striker\">Striker<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/m4ll0k\/SecretFinder\">SecretFinder (like API &amp; etc)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/m4ll0k\/Shodanfy.py\">Find Info Using Shodan<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/floriankunushevci\/rang3r\">Port Scanner &#8211; rang3r (Python 2.7)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/joeyagreco\/ranger-reloaded\">Port Scanner &#8211; Ranger Reloaded (Python 3+)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/s0md3v\/Breacher\">Breacher<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-wordlist-generator\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#wordlist-generator\" aria-hidden=\"true\"><\/a>Wordlist Generator<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/Mebus\/cupp.git\">Cupp<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/wlcreator\">WordlistCreator<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/UndeadSec\/GoblinWordGenerator.git\">Goblin WordGenerator<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Viralmaniar\/SMWYG-Show-Me-What-You-Got\">Password list (1.4 Billion Clear Text Password)<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-wireless-attack-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#wireless-attack-tools\" aria-hidden=\"true\"><\/a>Wireless attack tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/P0cL4bs\/wifipumpkin3\">WiFi-Pumpkin<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/wiire\/pixiewps\">pixiewps<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/andrewmichaelsmith\/bluepot\">Bluetooth Honeypot GUI Framework<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/thehackingsage\/Fluxion\">Fluxion<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/wifiphisher\/wifiphisher\">Wifiphisher<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/derv82\/wifite2\">Wifite<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/fakeap\">EvilTwin<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Z4nzu\/fastssh\">Fastssh<\/a><\/li>\n<li>Howmanypeople<\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-sql-injection-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#sql-injection-tools\" aria-hidden=\"true\"><\/a>SQL Injection Tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/sqlmapproject\/sqlmap\">Sqlmap tool<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/codingo\/NoSQLMap\">NoSqlMap<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/stamparm\/DSSS\">Damn Small SQLi Scanner<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/dtag-dev-sec\/explo\">Explo<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/JohnTroony\/Blisqy\">Blisqy &#8211; Exploit Time-based blind-SQL injection<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/leviathan-framework\/leviathan\">Leviathan &#8211; Wide Range Mass Audit Toolkit<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Cvar1984\/sqlscan\">SQLScan<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-phishing-attack-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#phishing-attack-tools\" aria-hidden=\"true\"><\/a>Phishing attack tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/trustedsec\/social-engineer-toolkit\">Setoolkit<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/UndeadSec\/SocialFish\">SocialFish<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/DarkSecDevelopers\/HiddenEye\">HiddenEye<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/kgretzky\/evilginx2\">Evilginx2<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Viralmaniar\/I-See-You\">I-See_You(Get Location using phishing attack)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/hangetzzu\/saycheese\">SayCheese (Grab target&#8217;s Webcam Shots)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/cryptedwolf\/ohmyqr\">QR Code Jacking<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/An0nUD4Y\/shellphish\">ShellPhish<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/iinc0gnit0\/BlackPhish\">BlackPhish<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-web-attack-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#web-attack-tools\" aria-hidden=\"true\"><\/a>Web Attack tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/santatic\/web2attack\">Web2Attack<\/a><\/li>\n<li>Skipfish<\/li>\n<li><a href=\"https:\/\/github.com\/aboul3la\/Sublist3r\">SubDomain Finder<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/UndeadSec\/checkURL\">CheckURL<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/UltimateHackers\/Blazy\">Blazy(Also Find ClickJacking)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/m4ll0k\/takeover\">Sub-Domain TakeOver<\/a><\/li>\n<li><a href=\"https:\/\/gitlab.com\/kalilinux\/packages\/dirb\" rel=\"nofollow\">Dirb<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-post-exploitation-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#post-exploitation-tools\" aria-hidden=\"true\"><\/a>Post exploitation tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/Screetsec\/Vegile\">Vegile &#8211; Ghost In The Shell<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/UndeadSec\/HeraKeylogger\">Chrome Keylogger<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-forensic-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#forensic-tools\" aria-hidden=\"true\"><\/a>Forensic tools<\/h3>\n<ul dir=\"auto\">\n<li>Autopsy<\/li>\n<li>Wireshark<\/li>\n<li><a href=\"https:\/\/github.com\/simsong\/bulk_extractor\">Bulk extractor<\/a><\/li>\n<li><a href=\"https:\/\/guymager.sourceforge.io\/\" rel=\"nofollow\">Disk Clone and ISO Image Acquire<\/a><\/li>\n<li><a href=\"https:\/\/www.toolsley.com\/\" rel=\"nofollow\">Toolsley<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-payload-creation-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#payload-creation-tools\" aria-hidden=\"true\"><\/a>Payload creation tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/Screetsec\/TheFatRat\">The FatRat<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Screetsec\/Brutal\">Brutal<\/a><\/li>\n<li><a href=\"https:\/\/nathanlopez.github.io\/Stitch\" rel=\"nofollow\">Stitch<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/g0tmi1k\/msfpc\">MSFvenom Payload Creator<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/r00t-3xp10it\/venom\">Venom Shellcode Generator<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/indexnotfound404\/spycam\">Spycam<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/kinghacker0\/Mob-Droid\">Mob-Droid<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/UndeadSec\/Enigma\">Enigma<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-exploit-framework\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#exploit-framework\" aria-hidden=\"true\"><\/a>Exploit framework<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/threat9\/routersploit\">RouterSploit<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/The404Hacking\/websploit\">WebSploit<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/commixproject\/commix\">Commix<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/santatic\/web2attack\">Web2Attack<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-reverse-engineering-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#reverse-engineering-tools\" aria-hidden=\"true\"><\/a>Reverse engineering tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/androguard\/androguard\">Androguard<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/lxdvs\/apk2gold\">Apk2Gold<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/skylot\/jadx\">JadX<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-ddos-attack-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#ddos-attack-tools\" aria-hidden=\"true\"><\/a>DDOS Attack Tools<\/h3>\n<ul dir=\"auto\">\n<li>SlowLoris<\/li>\n<li><a href=\"https:\/\/github.com\/fatihsnsy\/aSYNcrone\">Asyncrone | Multifunction SYN Flood DDoS Weapon<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/epsylon\/ufonet\">UFOnet<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/jseidl\/GoldenEye\">GoldenEye<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-remote-administrator-tools-rat\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#remote-administrator-tools-rat\" aria-hidden=\"true\"><\/a>Remote Administrator Tools (RAT)<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/nathanlopez\/Stitch\">Stitch<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/knassar702\/pyshell\">Pyshell<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-xss-attack-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#xss-attack-tools\" aria-hidden=\"true\"><\/a>XSS Attack Tools<\/h3>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/hahwul\/dalfox\">DalFox(Finder of XSS)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/capture0x\/XSS-LOADER.git\">XSS Payload Generator<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Damian89\/extended-xss-search\">Extended XSS Searcher and Finder<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/PR0PH3CY33\/XSS-Freak\">XSS-Freak<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/hahwul\/XSpear\">XSpear<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/menkrep1337\/XSSCon\">XSSCon<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Ekultek\/XanXSS\">XanXSS<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/UltimateHackers\/XSStrike\">Advanced XSS Detection Suite<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/iinc0gnit0\/RVuln\">RVuln<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/v8blink\/Chromium-based-XSS-Taint-Tracking\">Cyclops<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-steganograhy-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#steganograhy-tools\" aria-hidden=\"true\"><\/a>Steganograhy tools<\/h3>\n<ul dir=\"auto\">\n<li>SteganoHide<\/li>\n<li>StegnoCracker<\/li>\n<li><a href=\"https:\/\/github.com\/W1LDN16H7\/StegoCracker\">StegoCracker<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/beardog108\/snow10\">Whitespace<\/a><\/li>\n<\/ul>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-other-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#other-tools\" aria-hidden=\"true\"><\/a>Other tools<\/h3>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-socialmedia-bruteforce\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#socialmedia-bruteforce\" aria-hidden=\"true\"><\/a>SocialMedia Bruteforce<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/chinoogawa\/instaBrute\">Instagram Attack<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Matrix07ksa\/Brute_Force\">AllinOne SocialMedia Attack<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Matrix07ksa\/Brute_Force\">Facebook Attack<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/jakuta-tech\/underhanded\">Application Checker<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-android-hacking-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#android-hacking-tools\" aria-hidden=\"true\"><\/a>Android Hacking tools<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/F4dl0\/keydroid\">Keydroid<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/papusingh2sms\/mysms\">MySMS<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/JasonJerry\/lockphish\">Lockphish (Grab target LOCK PIN)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/kinghacker0\/WishFish\">DroidCam (Capture Image)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/crypticterminal\/EvilApp\">EvilApp (Hijack Session)<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/HatBashBR\/HatCloud\">HatCloud(Bypass CloudFlare for IP)<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-idn-homograph-attack\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#idn-homograph-attack\" aria-hidden=\"true\"><\/a>IDN Homograph Attack<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/UndeadSec\/EvilURL\">EvilURL<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-email-verify-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#email-verify-tools\" aria-hidden=\"true\"><\/a>Email Verify tools<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/4w4k3\/KnockMail\">Knockmail<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-hash-cracking-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#hash-cracking-tools\" aria-hidden=\"true\"><\/a>Hash cracking tools<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/s0md3v\/Hash-Buster\">Hash Buster<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-wifi-deauthenticate\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#wifi-deauthenticate\" aria-hidden=\"true\"><\/a>Wifi Deauthenticate<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/MisterBianco\/wifijammer-ng\">WifiJammer-NG<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/aryanrtm\/KawaiiDeauther\">KawaiiDeauther<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-socialmedia-finder\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#socialmedia-finder\" aria-hidden=\"true\"><\/a>SocialMedia Finder<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/Greenwolf\/social_mapper\">Find SocialMedia By Facial Recognation System<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/xHak9x\/finduser\">Find SocialMedia By UserName<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/sherlock-project\/sherlock\">Sherlock<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/iojw\/socialscan\">SocialScan | Username or Email<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-payload-injector\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#payload-injector\" aria-hidden=\"true\"><\/a>Payload Injector<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/UndeadSec\/Debinject\">Debinject<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/chinarulezzz\/pixload\">Pixload<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-web-crawling\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#web-crawling\" aria-hidden=\"true\"><\/a>Web crawling<\/h4>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/github.com\/jaeles-project\/gospider\">Gospider<\/a><\/li>\n<\/ul>\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-mix-tools\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#mix-tools\" aria-hidden=\"true\"><\/a>Mix tools<\/h4>\n<ul dir=\"auto\">\n<li>Terminal Multiplexer<\/li>\n<\/ul>\n<h2 dir=\"auto\" tabindex=\"-1\">Installation For Linux\u00a0<a href=\"https:\/\/camo.githubusercontent.com\/0d03ec25252a245110d80e71e989fb777490c5017af2b45af3ad78b07c41586e\/68747470733a2f2f6b6f6e70612e6769746875622e696f2f64657669636f6e2f64657669636f6e2e6769742f69636f6e732f6c696e75782f6c696e75782d6f726967696e616c2e737667\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/0d03ec25252a245110d80e71e989fb777490c5017af2b45af3ad78b07c41586e\/68747470733a2f2f6b6f6e70612e6769746875622e696f2f64657669636f6e2f64657669636f6e2e6769742f69636f6e732f6c696e75782f6c696e75782d6f726967696e616c2e737667\" alt=\"linux\" width=\"25\" height=\"25\" data-canonical-src=\"https:\/\/konpa.github.io\/devicon\/devicon.git\/icons\/linux\/linux-original.svg\" \/><\/a><\/h2>\n<p dir=\"auto\">\n<p dir=\"auto\" align=\"center\">\n<h4 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-this-tool-must-run-as-root-\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#this-tool-must-run-as-root-\" aria-hidden=\"true\"><\/a>This Tool Must Run As ROOT !!!<\/h4>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>git clone https:\/\/github.com\/Z4nzu\/hackingtool.git\r\n\r\nchmod -R 755 hackingtool  \r\n\r\ncd hackingtool\r\n\r\nsudo bash install.sh\r\n\r\nsudo hackingtool\r\n<\/code><\/pre>\n<\/div>\n<p dir=\"auto\">After Following All Steps Just Type In Terminal\u00a0<strong>root@kaliLinux:~<\/strong>\u00a0<strong>hackingtool<\/strong><\/p>\n<h2 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-use-image-with-docker\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#use-image-with-docker\" aria-hidden=\"true\"><\/a>Use image with Docker<\/h2>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-run-in-one-click\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#run-in-one-click\" aria-hidden=\"true\"><\/a>Run in one click<\/h3>\n<p dir=\"auto\"><code>docker run -it vgpastor\/hackingtool<\/code><\/p>\n<h3 dir=\"auto\" tabindex=\"-1\"><a id=\"user-content-build-locally\" class=\"anchor\" href=\"https:\/\/github.com\/Z4nzu\/hackingtool#build-locally\" aria-hidden=\"true\"><\/a>Build locally<\/h3>\n<p dir=\"auto\"><code>docker-compose build<\/code><\/p>\n<p dir=\"auto\"><code>docker-compose run hackingtool<\/code><\/p>\n<ul dir=\"auto\">\n<li>If need open other ports you can edit the docker-compose.yml file<\/li>\n<li>Volumes are mounted in the container to persist data and can share files between the host and the container<\/li>\n<\/ul>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D959\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=959&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>Anonymously Hiding Tools Information gathering tools Wordlist Generator Wireless attack tools SQL Injection Tools Phishing attack tools Web Attack tools Post exploitation tools Forensic tools Payload creation tools Exploit framework Reverse engineering tools DDOS Attack Tools Remote Administrator Tools (RAT) XSS Attack Tools Steganograhy tools Other tools SocialMedia Bruteforce Android Hacking tools IDN Homograph Attack [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":965,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[8],"tags":[],"class_list":["post-959","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/959"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=959"}],"version-history":[{"count":1,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/959\/revisions"}],"predecessor-version":[{"id":966,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/959\/revisions\/966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/965"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}