Copied from: Daniel Kelley, on LinkedIn
Former Black Hat Hacker. Contributed to over 100 bug bounty programs. Writes about cybersecurity and privacy.
NOTE: If you decide to use any of these tools, it is at your own risk; I do not accept any responsibility for anybody else’s actions.
Introducing 24 web-application hacking tools:
- Burp Suite – Framework.
- ZAP Proxy – Framework.
- Dirsearch – HTTP bruteforcing.
- Nmap – Port scanning.
- Sublist3r – Subdomain discovery.
- Amass – Subdomain discovery.
- SQLmap – SQLi exploitation.
- Metasploit – Framework.
- WPscan – WordPress exploitation.
- Nikto – Webserver scanning.
- HTTPX – HTTP probing.
- Nuclei – YAML based template scanning.
- FFUF – HTTP probing.
- Subfinder – Subdomain discovery.
- Masscan – Mass IP and port scanner.
- Lazy Recon – Subdomain discovery.
- XSS Hunter – Blind XSS discovery.
- Aquatone – HTTP based recon.
- LinkFinder – Endpoint discovery through JS files.
- JS-Scan – Endpoint discovery through JS files.
- GAU – Historical attack surface mapping.
- Parameth – Bruteforce GET and POST parameters.
- truffleHog – Find credentials in GitHub commits.