Hacking skills and tools you should have

1 year ago 70
BOOK THIS SPACE FOR AD
ARTICLE AD

Hacking skills and tools you should have

1.Tamper Data
2.Hack Bar
3.Live HTTP headers
4.User-Agent Switcher
5.Flagfox
6.Domain Details
7.Cookie Manager+
8.HttpFox
9.XSS Me
10.Fireforce
11.Wappalyzer
12.PassiveRecon
13.Blur
14.Poster
15.NoScript
16.CSRF Finder
17.Copy As Plain Text
18.FoxyProxy Standard
19.RightClickXSS
20.Export/import cookies
21.Firebug
22.CryptoFox
23.NoRedirect
24.Ghostery
25.Privacy Badger
26.Disconnect
27.Adblock Plus
28.Hoxx VPN
29.buffer overflows

#Maps

1.Network Plus
2.CEH
3.Linux Commands
4.Cmd Commands
5.Kali Linux Tools
6.Windows Tools
7.Learning Bugs
8.Learning Python
9.Learning Ruby

#Tools

1.DDoS
2.Forensics
3.Programming
4.Exploitation
5.Phone Hacking
6.Server Hacking
7.Client Hacking
8.Website Hacking
9.Network Hacking
10.Wireless Hacking
11.Reverse Engeenering
12.Information Gathering

#DDoS

1.MDK3
2.LOIC
3.HULK
4.DDOSIM
5.Ufonet
6.Hping3
7.Xerxes
8.Hammer
9.Slowloris
10.Websploit
11.GoldenEye
12.Metasploit
13.Aireplay-ng
14.Slowhttptest
15.CMD?

#Forensics

1.COFEE
2.Volafox
3.Autopsy
4.Foremost
5.Hashdeep
6.Binwalk

#Programming

1.Notepad++
2.Visual Studio
3.Text Editor
Many more……

#Exploitation

1.Metasploit
2.Sqlmap
3.Core Imact
4.W3af
5.BeEF
6.Dradis

#Phone Hacking

1.Metasploit
2.Apktool
3.Droidjack
4.RATs
5.Spywere
6.Backdoor playlode

#Server Hacking

1.SQLmap
2.Jsql
3.Havij
4.Hydra
5.Metasploit
6.Armitage
7.Brupsuite
8.Owasp-ZAP
9.Netsparker
10.Acunetix
11.OpenVAS

#Client Hacking

1.Darkcomet
2.FatRat
3.Veil-Evasion
4.Shallter
5.Unicorn
6.Setoolkit
7.Armitage
8.BeEF-Framework
9.EmPyre
10.FakeImageExploiter
11.Pupy
12.DFU-Programmer
13.Cobalt Strike
14.Exploitpack
15.Gcat
16.Crowbar

#Website Hacking

1.Sniper
2.Owasp-ZAP
3.Brupsuite
4.Netsparker
5.Acunetix
6.SQLmap
7.Xsser
8.WPScan
9.Joomrra
10.Joomscan
11.WPSeku
12.XSStrike
13.Kadimus
14.jexboss
15.CMSmap
16.brut3k1t
17.0d1n
18.CloudFail
19.Arachni
20.Nikto
21.Webscarab
22.Nmap
23.Vbscan
24.Sentry MBA

#Network Hacking

1.MITMf
2.Bettercap
3.Ettercap
4.Tcpdump
5.Wireshark
6.Driftnet
7.SSLstrip
8.Armitage
9.Metasploit
10.Xerosploit
11.Sparta
12.Hydra
13.some scripts
14Nmap

#Wireless Hacking

1.Wifite
2.Airodump-ng
3.Aireplay-ng
4.Wash
5.WiFi Pumpkin
6.Wifiphisher
7.Fluxion
8.Infernal Twin
9.WPSpin

#Reverse Engeenering

1.OWASP-ZSC
2.OllyDBG
3.Apktool

#Methods

1.DDoS
2.Forensics
3.Programming
4.Exploitation
5.Phone Hacking
6.Server Hacking
7.Client Hacking
8.Website Hacking
9.Network Hacking
10.Wireless Hacking
11.Reverse Engeenering
12.Information Gathering

#DDoS

1.Nuke
2.Botnet
3.Zero Day
4.Slowloris
5.SYN Flood
6.Reflected
7.Multi Vector
8.Peer to Peer
9.Ping of Death
10.Protocol Flood
11.Application Level

#Forensics

1.History
2.Etymology
3.Maturation
4.Toxicology
5.References
6.Bibliography
7.Fingerprints
8.Anthropometry

*#Programming*

1.C
2.PHP
3.ASP
4.Ruby
5.Bash
6.Perl
7.Python
8.Assembly
9.JavaScript
And many more,…….

*#Exploitation*

1.RCE
2.BOF
3.POC
4.SQL Injection
5.Code Execution
6.Command Injection
7.Abritrary Library

*#Phone Hacking*

1.BOF
2.RCE
3.DOS
4.Bind RAT
5.spywere

*#Server Hacking*

1.BOF
2.RCE
3.SSRF
4.Zero Day
5.Privilage
6.Bruteforce
7.Upload Shell
8.SQL Injection

*#Client Hacking*

1.RAT
2.BOF
3.RCE
4.Virus
5.Binder
6.Cryption
7.Phishing
8.Backdoor
9.Keylogger
10.Privilage
11.Bruteforce
12.Steal Passwords
13.Social Engeenering

*#Website Hacking*

1.DOS
2.XSS
3.RCE
4.XXE
5.CSRF
6.SSRF
7.LFI/RFI
8.Cracking
9.Bruteforce
10.Upload Shell
11.SQL Injection
12.Google Hacking
13.Xpath Injection
14.BoF

#Network Hacking

1.BOF
2.RCE
3.VoIP
4.MITM
5.Spoof
6.Sniff
7.Bruteforce
8.Cupture Packet

#Wireless Hacking

1.WPSpin
2.FakeAP
3.Eviltwin
4.Handshake
5.mitm
6.evilgnix

#Reverse Engeenering

1.Compiler
2.Shellcode
3.App Cracking
4.Serial Cracking
5.Decompile Softwares

#Information Gathering

1.Enum
2.Recon
3.Whois
4.Email Contact
5.Phone Contact
6.Service Status
7.Protocol Analysis
8.doxerv2.0

Read Entire Article