This ethical hacking toolkit brings together the most powerful and used tools in security auditing, forensic analysis, OSINT, vulnerability exploitation and penetration testing. Designed for cybersecurity professionals, ethical hackers and cybersecurity enthusiasts.
βοΈ Scanning and recognition (Nmap, Masscan, Recon-ng)
βοΈ Vulnerability exploitation (Metasploit, SQLmap, ExploitDB)
βοΈ Reverse engineering (Radare2, Ghidra, IDA Free)
βοΈ Brute force attacks (Hydra, John the Ripper, Hashcat)
βοΈ OSINT and intelligence (theHarvester, Maltego, SpiderFoot)
βοΈ Wireless network tests (Aircrack-ng, Reaver, Bettercap)
βοΈ Forensic analysis (Autopsy, Volatility, Wireshark)
βοΈ Anonymity and privacy (Tor, ProxyChains, Tails, Whonix)
Clone the repository and access the tools quickly:
git clone https://github.com/D1se0/toolsKitHacking.git
cd toolsKitHackingπ Note: Some tools require superuser permissions. Make sure to run them with sudo when necessary.
Each tool is well documented and with examples in the info.txt files.
This toolkit is for educational use and security testing in authorized environments only. Misuse of these tools may be illegal. The author is not responsible for inappropriate use.
Contributions are welcome! If you have an interesting tool to add, open a Pull Request or create an Issue.
π» Follow me on social networks and stay updated
π© For any questions or suggestions, contact me at [[email protected]].