Free Top 30 Hacking Tools used by Black Hat Hackers

When I have began to learn hacking in 2013, the only question was stuck in my mind always what are the free hacking tools employed by top hackers worldwide. At that point I even have been working as a Linux supervisor , and have good command over Linux. So I chose the Backtrack OS to start out hacking.

Today I can understand your condition if you’re learning the way to hack and still confused about hacking tools employed by pro hacker and penetration tester then this post has relevancy for you.

Free Hacking tools for Information Gathering

#1 OSINT Framework

OSINT Framework This is not a tool but framework focused on gathering information using different tools available open source (over internet). The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.

#2 SHODAN

SHODAN: Shodan also is not a tool, it is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client.[1] This can be information about the server software, what options the service supports, a welcome message or anything else that the client can find out before interacting with the server.

#3 Check User Name

CheckUserName: It is an online service that helps hacker to check usernames more than over 170 social networks. This is especially useful if Hacker is looking for social media accounts with a specific username and helpful The penetration tester for running an investigation to determine the usage of the same username on different social networks.

#4 Google Dorks

GOOGLE DORKS: Hacker never forgets to gather useful information using the search engine Google. Google hacking is a technique to get information hidden in a deep search engine Database. Google Hacking Database is the collection of google dorks.

#5 Maltego

Maltego: Maltego is the passive information gathering tool condition if may collect informative data from the internet available publicly. It can also gather information about individuals such as their potential email addresses/ phone no./Address etc.

#6 Recon-ng

Recon-ng: Recon-ng is another great tool pre-built in Kali Linux used to perform gathering information quickly. it is a full-featured Web Framework, it’s written in python. Complete with independent modules, database interaction, built-in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and thoroughly.

#7 Whois

A whois Kali Linux command is a utility as a part of the information gathering used in all of the Linux-based operating systems. this tool is part of information security assessment, and one of the information gathering techniques. there are a lot of information gathering strategies. It is used to identify domain information and more. Whois.com

#8 DIG (Domain Information Gropper)

Dig: The ‘dig command‘ is used in network administration that check and lookup domain name server (DNS) It is dnssec and the part of information gathering.

dnsenum
Find Information related Domain Name servers, mail servers, exchange server, file server etc.

#9 Theharvester

Theharvester: Grab email addresses by using it search engine database, it is mostly used to collect email details of particular domain. thehaverster in Kali Linux tutorial

theharvester

#10 Creepy

Creepy: Creepy is a geolocation OSINT tool for penetration tester. Gathers geolocation related information from online sources by querying social networking platforms like Twitter, Flicker, and Facebook etc, and allows for presentation on map.

If anyone uploads images on social media with geolocation activated then you will see a full geo location of a person.
It search filtering based on exact location and/or date, export in csv format or kml for further analysis in Google Maps.

Free Hacking tools for Network Scanning

#11 Nmap – A Network Scanner Free tool

Nmap is a free hacking tool and most used worldwide in terms of network scanning. It is used to detect live hosts in the network, open ports of devices, running service on the same port with version detail, also used for vulnerability scanning.

It is free tool and available for windows, Linux, Free BSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.

Nmap is a powerful tool, has been used to scan huge networks of literally hundreds of thousands of machines in the same network or the network

#12 Angry IP Scanner

Angry IP Scanner is an open-source, simple and fast tool to use. It is a cross-platform network scanner.

It is widely used by network administrators, hackers, Penetration tester and just curious users around the world, including large and small enterprises, banks, and government agencies.

It is available for Linux, Windows, and Mac OS X, may be supporting other platforms as well.

It scans IP addresses and ports as well as has many other features as below:

  • Scans local networks as well as Interne
  • IP Range, Random or file in any format
  • Exports results into many formats
  • Extensible with many data fetchers
  • Provides command-line interface
  • Over 29 million downloads
  • Free and open-source
  • Works on Windows, Mac and Linux
  • Installation not required

#13 Advanced IP Scanner

Advanced IP scanner is one of the realible, free and popular scanners for analyzing Local network in a minute. User can see the available network devices and can access the shared folder.

It provides remote control over computers using RDP and Radmin, and can even switch off computers.

It is available in a portable mode, you can have this tool in your pen drive.

#14 IP Scanner

It is free tool powered by Lansweeper. It is used to scanning network and provide all conected devices in the network.

Extra feature is scheduling a network scan or run o n demand whenever you want.

Features are:

  • scan IP ranges automatically or on demand
  • re-discover an entire subnet with just one click
  • exclude devices from the results based on type or IP address
  • import your entire network setup via a CSV file
  • and do so much more!

#15 Hping3

ICMP Scanning by using Hping3

It is available in Kali Linux by default it is one of DOS attack software, DDOS stand for distributed denial of service attack. you can launch and stop the DOS attack, whenever you want. In this illustration, hping3 will act as an ordinary ping utility, sending ICMP-reverberation und getting ICMP-reply

#16 NetDiscover

netdiscover main

Netdiscover is an ultimate scanning tool used to get the internal IP address and MAC address of live hosts in the network. Netdiscover is a pre-installed tool in Kali Linux, if you are using Kali Linux then you don’t need to install netdiscover. No doubt nmap is the best tool for scanning network but Netdiscover is also a good tool for finding an Internal IP address and MAC address. So this tool continuously exits on the Kali Linux repository before it was in the backtrack repository as well.

Must Read: 10 best open port checker Or Scanner

Vulnerability Assesment tools

#17 OpenVAS

OpenVAS does not default in Kali Linux if you want to use, you must install it first. It is available on the Kali Linux repository so you can install directly from the terminal using apt-get utility.

OpenVAS Documentation

The OpenVAS scanner is a comprehensive vulnerability assessment system that can detect security issues in all manner of servers and network devices.

Results will be delivered to your email address for analysis; allowing you to start re-mediating any risks your systems face from external threats.

Vulnerability scanning is a crucial phase of a penetration test and having an updated vulnerability scanner in your security toolkit can often make a real difference by helping you discover overlooked vulnerable items. For this reason, we’ve manually packaged the latest and newly released OpenVAS 8.0 tool and libraries for Kali Linux. Although nothing major has changed in this release in terms of running the vulnerability scanner, we wanted to give a quick overview on how to get it up and running.

#19 Nikto – Web Scanner

Nikto is very short in name, but work is great.

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.

#20 Nexpose – Community Addition

Nexpose community vulnerability tool is developed by Rapid7 which is an open source tool. It is widely used for vulnerability scanning and a wide range of network intrusion checks. The following are the key features of Nexpose Community tool.

  • The tool is quite detailed in its scanning where it takes into account the age of the vulnerability such as malware kit employed, the advantages taken by the kit, etc.
  • The tool can be easily combined with a Metaspoilt framework.
  • The tool is capable to scan the new devices in order to detect the vulnerabilities and evaluate the network.
  • It can monitor the vulnerabilities exposures real time and can familiarize itself to the latest hazards very efficiently.
  • The tool categorizes the risks post scanning for vulnerability into low, medium, or high scale.

Download Nexpose: Nexpose Comunity Adition

#21 Retina CS Community

Retina CS is an open source free vulnerability scanner tool. It is a web-based console. It is used for Identify network vulnerabilities (including zero-day), configuration issues, & missing patches across operating systems, applications, devices, and virtual environments.

Features:

  • The tool is good for network security administrators, help to saves both time and money required for network security management.
  • It can perform automated vulnerability scans for workstations, web servers, web applications, and databases very swiftly.
  • It can provide an assessment of cross-platform vulnerability.
  • It has features to provide patching, configuration compliance, compliance reporting, etc.
  • The tool supports virtual environments such as virtual app scanning, vCenter integration, etc.

Download: Retina CS Community Tool

Web Application Analyzing Tools

#22 WPscan

wpscan

Wpscan a small tool written in ruby and preinstalled in Kali Linux, if you are using another Linux distribution, then install wpscan first.

Wpscan is used to scan the wordpress website for known vulnerabilities within WordPress core files, plugin, and themes. you can enumerate users for a weak password, users and security misconfiguration.

WPscan Tutorial: WpScan

#23 HTTrack – Website Copier

Httrack graphical

HTTrack is a free (GPL, libre/free software) and easy-to-use offline browser utility.

It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site’s relative link-structure. Simply open a page of the “mirrored” website in your browser, and you can browse the site from link to link, as if you were viewing it online. HTTrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.

WinHTTrack is the Windows (from Windows 2000 to Windows 10 and above) release of HTTrack, and WebHTTrack the Linux/Unix/BSD release.

See the download page. HTTrack Download

#24 Arachani Web Scanner

Arachni scanner

If you are Kali Linux user, then you shouldn’t worry about arachani web scanner is available for Kali Linux. Just run following command to install

#apt-get install arachni

The Arachni scanner is an escalated tool that runs from a web interface much likened to that of Tenable’s Nessus. Notwithstanding, dissimilar to Nessus, Arachni can just perform a scan against one host on one port at a time. On the off chance that there are different web services running on a host and not serviced from the port, then repeated scan will must launch separately. For example, http://www.xyz-company.com/ is facilitating a web application security services on port 80 and phpmyadmin on port 443 (HTTPS), the Arachni scanner will must be run twice. It’s not a blaze and overlook kind of system. Arachni likewise has an exceptionally configurable structure. The plugins and settings for Arachni take into account accuracy checking, and all plugins are enabled by default. Reporting is a snap and could be designed in numerous diverse sorts of output

#25 sqlmap – Database Enumerator

Sqlmap is default in Kali Linux, Use and enjoy to get important information from database server.

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.

It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Features :

  • Supported databases are MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, Informix, HSQLDB.
  • Six sql injetion techniques support: boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries and out-of-band.
  • Direct connect to the database and enumerate data without DBMS credentials.
  • It can dump databse tables.
  • It support to download and upload any file from the database server underlying file system when the database software is MySQL, PostgreSQL or Microsoft SQL Server.
  • the database server underlying file system when the database software is MySQL, PostgreSQL or Microsoft SQL Server.

Free Hacking tools for Password Cracking

#26 John The Ripper

john the ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS.

John, better known as John the Ripper, is a tool to find weak passwords of users in a server. John can map a dictionary or some search pattern as well as a password file to check for passwords. John supports different cracking modes and understands many ciphertext formats, like several DES variants, MD5 and blowfish. It can also be used to extract AFS and Windows NT passwords.

Documentation : https://www.openwall.com/john/doc/

#27 Hashcat

According to official website Hashcat is the world’s fastest CPU-based password recovery tool.

While it’s not as fast as its GPU counterpart oclHashcat, large lists can be easily split in half with a good dictionary and a bit of knowledge of the command switches.

Hashcat was written somewhere in the middle of 2009. Yes, there were already close-to-perfect working tools supporting rule-based attacks like “PasswordsPro”, “John The Ripper”. However for some unknown reason, both of them did not support multi-threading. That was the only reason to write Hashcat: To make use of the multiple cores of modern CPUs.

Granted, that was not 100% correct. John the Ripper already supported MPI using a patch, but at that time it worked only for Brute-Force attack. There was no solution available to crack plain MD5 which supports MPI using rule-based attacks.

Must Read: Hashcat Tutorial – Bruteforce Mask Attack

#28 Cain and Abel

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

29 Hydra-THC

According to official website of thc-hydra, One of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system and different online services

There are already several login hacking tools available, however the online services Either support more than one protocol to attack or support panellized Connects.

#30 FcrackZip

fcrackzip searches each zipfile given for encrypted files and tries to guess the password. All files must be encrypted with the same password, the more files you provide, the better.

Have you ever mis-typed a password for unzip? Unzip reacted pretty fast with ´incorrect password´, without decrypting the whole file. While the encryption algorithm used by zip is relatively secure, PK made cracking easy by providing hooks for very fast password-checking, directly in the zip file. Understanding these is crucial to zip password cracking.

Free hacking tools for Wi-Fi

#31 Aircrack-ng

Aircrack-ng is not a tool, but it is a complete set of tools including used to audit wireless network security.

It focuses on different areas of WiFi security:

  • Monitoring: Packet capture and export of data to text files for further processing by third party tools
  • Attacking: Replay attacks, deauthentication, fake access points and others via packet injection
  • Testing: Checking WiFi cards and driver capabilities (capture and injection)
  • Cracking: WEP and WPA PSK (WPA 1 and 2)

All tools are command line which allows for heavy scripting. A lot of GUIs have taken advantage of this feature. It works primarily Linux but also Windows, OS X, FreeBSD, OpenBSD, NetBSD, as well as Solaris and even eComStation 2

Aircrack-ng Documentation: https://www.aircrack-ng.org/doku.php#documentation

#32 Fern Wifi Cracker

Fern Wifi Cracker is GUI (Graphical User Interface) based tool. It is easy to use. If you are not command lover person then this is a best tool for you to crack wifi including WEP/WPA/WPA2.

Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.

Features:

  • WEP Cracking with Fragmentation,Chop-Chop, Caffe-Latte, Hirte, ARP Request Replay or WPS attack
  • WPA/WPA2 Cracking with Dictionary or WPS based attacks
  • Automatic saving of key in database on successful crack
  • Automatic Access Point Attack System
  • Session Hijacking (Passive and Ethernet Modes)
  • Access Point MAC Address Geo Location Tracking
  • Internal MITM Engine
  • Bruteforce Attacks (HTTP,HTTPS,TELNET,FTP)
  • Update Support

Leave a Reply

Your email address will not be published. Required fields are marked *