1.Tamper Data
2.Hack Bar
3.Live HTTP headers
4.User-Agent Switcher
5.Flagfox
6.Domain Details
7.Cookie Manager+
8.HttpFox
9.XSS Me
10.Fireforce
11.Wappalyzer
12.PassiveRecon
13.Blur
14.Poster
15.NoScript
16.CSRF Finder
17.Copy As Plain Text
18.FoxyProxy Standard
19.RightClickXSS
20.Export/import cookies
21.Firebug
22.CryptoFox
23.NoRedirect
24.Ghostery
25.Privacy Badger
26.Disconnect
27.Adblock Plus
28.Hoxx VPN
29.buffer overflows
#Maps
1.Network Plus
2.CEH
3.Linux Commands
4.Cmd Commands
5.Kali Linux Tools
6.Windows Tools
7.Learning Bugs
8.Learning Python
9.Learning Ruby
#Tools
1.DDoS
2.Forensics
3.Programming
4.Exploitation
5.Phone Hacking
6.Server Hacking
7.Client Hacking
8.Website Hacking
9.Network Hacking
10.Wireless Hacking
11.Reverse Engeenering
12.Information Gathering
#DDoS
1.MDK3
2.LOIC
3.HULK
4.DDOSIM
5.Ufonet
6.Hping3
7.Xerxes
8.Hammer
9.Slowloris
10.Websploit
11.GoldenEye
12.Metasploit
13.Aireplay-ng
14.Slowhttptest
15.CMD?
#Forensics
1.COFEE
2.Volafox
3.Autopsy
4.Foremost
5.Hashdeep
6.Binwalk
#Programming
1.Notepad++
2.Visual Studio
3.Text Editor
Many more……
#Exploitation
1.Metasploit
2.Sqlmap
3.Core Imact
4.W3af
5.BeEF
6.Dradis
#Phone Hacking
1.Metasploit
2.Apktool
3.Droidjack
4.RATs
5.Spywere
6.Backdoor playlode
#Server Hacking
1.SQLmap
2.Jsql
3.Havij
4.Hydra
5.Metasploit
6.Armitage
7.Brupsuite
8.Owasp-ZAP
9.Netsparker
10.Acunetix
11.OpenVAS
#Client Hacking
1.Darkcomet
2.FatRat
3.Veil-Evasion
4.Shallter
5.Unicorn
6.Setoolkit
7.Armitage
8.BeEF-Framework
9.EmPyre
10.FakeImageExploiter
11.Pupy
12.DFU-Programmer
13.Cobalt Strike
14.Exploitpack
15.Gcat
16.Crowbar
#Website Hacking
1.Sniper
2.Owasp-ZAP
3.Brupsuite
4.Netsparker
5.Acunetix
6.SQLmap
7.Xsser
8.WPScan
9.Joomrra
10.Joomscan
11.WPSeku
12.XSStrike
13.Kadimus
14.jexboss
15.CMSmap
16.brut3k1t
17.0d1n
18.CloudFail
19.Arachni
20.Nikto
21.Webscarab
22.Nmap
23.Vbscan
24.Sentry MBA
#Network Hacking
1.MITMf
2.Bettercap
3.Ettercap
4.Tcpdump
5.Wireshark
6.Driftnet
7.SSLstrip
8.Armitage
9.Metasploit
10.Xerosploit
11.Sparta
12.Hydra
13.some scripts
14Nmap
#Wireless Hacking
1.Wifite
2.Airodump-ng
3.Aireplay-ng
4.Wash
5.WiFi Pumpkin
6.Wifiphisher
7.Fluxion
8.Infernal Twin
9.WPSpin
#Reverse Engeenering
1.OWASP-ZSC
2.OllyDBG
3.Apktool
#Methods
1.DDoS
2.Forensics
3.Programming
4.Exploitation
5.Phone Hacking
6.Server Hacking
7.Client Hacking
8.Website Hacking
9.Network Hacking
10.Wireless Hacking
11.Reverse Engeenering
12.Information Gathering
#DDoS
1.Nuke
2.Botnet
3.Zero Day
4.Slowloris
5.SYN Flood
6.Reflected
7.Multi Vector
8.Peer to Peer
9.Ping of Death
10.Protocol Flood
11.Application Level
#Forensics
1.History
2.Etymology
3.Maturation
4.Toxicology
5.References
6.Bibliography
7.Fingerprints
8.Anthropometry
*#Programming*
1.C
2.PHP
3.ASP
4.Ruby
5.Bash
6.Perl
7.Python
8.Assembly
9.JavaScript
And many more,…….
*#Exploitation*
1.RCE
2.BOF
3.POC
4.SQL Injection
5.Code Execution
6.Command Injection
7.Abritrary Library
*#Phone Hacking*
1.BOF
2.RCE
3.DOS
4.Bind RAT
5.spywere
*#Server Hacking*
1.BOF
2.RCE
3.SSRF
4.Zero Day
5.Privilage
6.Bruteforce
7.Upload Shell
8.SQL Injection
*#Client Hacking*
1.RAT
2.BOF
3.RCE
4.Virus
5.Binder
6.Cryption
7.Phishing
8.Backdoor
9.Keylogger
10.Privilage
11.Bruteforce
12.Steal Passwords
13.Social Engeenering
*#Website Hacking*
1.DOS
2.XSS
3.RCE
4.XXE
5.CSRF
6.SSRF
7.LFI/RFI
8.Cracking
9.Bruteforce
10.Upload Shell
11.SQL Injection
12.Google Hacking
13.Xpath Injection
14.BoF
#Network Hacking
1.BOF
2.RCE
3.VoIP
4.MITM
5.Spoof
6.Sniff
7.Bruteforce
8.Cupture Packet
#Wireless Hacking
1.WPSpin
2.FakeAP
3.Eviltwin
4.Handshake
5.mitm
6.evilgnix
#Reverse Engeenering
1.Compiler
2.Shellcode
3.App Cracking
4.Serial Cracking
5.Decompile Softwares
#Information Gathering
1.Enum
2.Recon
3.Whois
4.Email Contact
5.Phone Contact
6.Service Status
7.Protocol Analysis
8.doxerv2.0
Disclaimer
This content has been shared under Educational And Non-Profit Purposes Only.
Hacksnation.com cannot be liable for what a person decides to do with this knowledge.