UNLIMTED HACKING PACK (FREE)


UNLIMTES HACKING PACK

Hacking Tools (1-100):

  1. Aircrack-ng
  2. Burp Suite
  3. Cain & Abel
  4. DirBuster
  5. Ettercap
  6. Fiddler
  7. Ghidra
  8. Hydra
  9. IDA Pro
  10. John the Ripper
  11. Kismet
  12. L0phtCrack
  13. Metasploit
  14. Nmap
  15. OpenVAS
  16. PuTTY
  17. QEMU
  18. Responder
  19. SQLMap
  20. Tcpdump
  21. Unicornscan
  22. Veil
  23. Wireshark
  24. Xplico
  25. Yersinia
  26. ZAP (Zed Attack Proxy)
  27. Hashcat
  28. Nikto
  29. Acunetix
  30. Maltego
  31. SET (Social-Engineer Toolkit)
  32. OWASP ZAP
  33. Recon-ng
  34. Snort
  35. Faraday
  36. Nessus
  37. Nexpose
  38. Maligno
  39. Netcat
  40. Proxychains
  41. Medusa
  42. Skipfish
  43. Maltrail
  44. Lynis
  45. Yara
  46. Cuckoo Sandbox
  47. Beef Framework
  48. Anonsurf
  49. Armitage
  50. Dnsenum
  51. Evilginx
  52. Fern WiFi Cracker
  53. Ghost Phisher
  54. Gobuster
  55. Hping
  56. Impacket
  57. ReconDog
  58. Fluxion
  59. Goblin
  60. Hammer
  61. HashBuster
  62. ProxyStrike
  63. Mimikatz
  64. MagicTree
  65. SQLninja
  66. Swaks
  67. Termite
  68. w3af
  69. Yasca
  70. Fluxion
  71. Firewalk
  72. Fierce
  73. Frozer
  74. HULK (Http Unbearable Load King)
  75. IPSec-Scan
  76. MalSploitBase
  77. NetStumbler
  78. Pompem
  79. PowerSploit
  80. Skipfish
  81. Th3inspector
  82. Unicorn
  83. vBulletin Scanner
  84. XSSer
  85. XSSPy
  86. Zarp
  87. Zenmap
  88. Sublist3r
  89. Angry IP Scanner
  90. WiFite
  91. WPScan
  92. CheckSec
  93. Detekt
  94. Enum4linux
  95. Impacket
  96. Netdiscover
  97. Reaver
  98. Slowloris
  99. SQLBrute
  100. Zed Attack Proxy

Types of Hacking Attacks (101-200):

  1. Adware
  2. Brute Force Attack
  3. Cross-Site Scripting (XSS)
  4. Denial of Service (DoS)
  5. Distributed Denial of Service (DDoS)
  6. Eavesdropping Attack
  7. Phishing
  8. Smishing
  9. Grayware
  10. Honeypot Attack
  11. Injection Attack
  12. Keylogging
  13. Logic Bomb
  14. Man-in-the-Middle Attack (MITM)
  15. Null Session Attack
  16. Password Cracking
  17. Ransomware
  18. Social Engineering
  19. Trojan Horse
  20. URL Spoofing
  21. Vishing
  22. Watering Hole Attack
  23. Wireless Sniffing
  24. Zero-Day Exploit
  25. Clickjacking
  26. Cookie Poisoning
  27. File Inclusion Attack
  28. Session Hijacking
  29. Privilege Escalation
  30. Buffer Overflow
  31. SQL Injection
  32. Command Injection
  33. XML Injection
  34. DNS Spoofing
  35. ARP Poisoning
  36. Bluetooth Attack
  37. RFID Skimming
  38. Firmware Attack
  39. Cold Boot Attack
  40. Data Theft
  41. Cryptojacking
  42. Malvertising
  43. Spam Attack
  44. Spear Phishing
  45. Pharming
  46. Rogue Access Points
  47. MAC Flooding
  48. Evil Twin Attack
  49. DNS Tunneling
  50. Session Fixation
  51. Birthday Attack
  52. Rainbow Table Attack
  53. Timing Attack
  54. SQL Slammer Attack
  55. POODLE Attack
  56. Shellshock Attack
  57. Cache Poisoning
  58. Heartbleed Attack
  59. IP Spoofing
  60. Side-Channel Attack
  61. MITB (Man-in-the-Browser) Attack
  62. Smurf Attack
  63. SYN Flood
  64. Teardrop Attack
  65. Distributed Reflection Denial of Service (DRDoS)
  66. Slowloris Attack
  67. HTTP Flood
  68. Fraggle Attack
  69. Replay Attack
  70. Cryptanalysis Attack
  71. Cross-Site Request Forgery (CSRF)
  72. Host Header Injection
  73. HTTP Parameter Pollution (HPP)
  74. DNS Amplification Attack
  75. Watermarking Attack
  76. Spoofing Attack
  77. Traffic Analysis Attack
  78. Web Cache Poisoning
  79. SQL Injection
  80. Cross-Site Scripting (XSS)
  81. Cross-Site Request Forgery (CSRF)
  82. Drive-by Download Attack
  83. Phreaking
  84. DNS Rebinding Attack
  85. Wardriving
  86. Bluejacking
  87. Bluesnarfing
  88. Keychain Attack
  89. Credential Stuffing
  90. Evasion Techniques
  91. Man-in-the-Middle Attack
  92. Privilege Escalation
  93. Insider Attack
  94. Replay Attack
  95. Spoofing Attack
  96. Bluebugging
  97. Tabnabbing
  98. Watering Hole Attack
  99. Wi-Fi Pineapple Attack
  100. Zip Bomb

Operating Systems (201-300):

  1. Kali Linux
  2. Parrot OS
  3. BlackArch
  4. BackBox
  5. DEFT Linux
  6. Fedora Security Lab
  7. ArchStrike
  8. Samurai Web Testing Framework
  9. Cyborg Hawk
  10. Knoppix STD
  11. Pentoo
  12. Matriux
  13. Qubes OS
  14. Whonix
  15. Tails
  16. Ophcrack Live
  17. LionSec
  18. BlackBuntu
  19. Network Security Toolkit (NST)
  20. Caine
  21. WEAKERTH4N
  22. Bugtraq
  23. ArchStrike
  24. RedHawk Linux
  25. NodeZero
  26. Samurai Web Testing Framework
  27. IprediaOS
  28. Lightweight Portable Security (LPS)
  29. HoneyDrive
  30. Tiny Core Linux
  31. WhiteHat Linux
  32. URIX OS
  33. CentOS Security Lab
  34. Ubuntu Studio
  35. FreeBSD
  36. Gentoo
  37. Alpine Linux
  38. VENOM Linux
  39. Hacking OS
  40. Linux Kodachi
  41. Archcraft
  42. Xubuntu
  43. Zorin OS
  44. Slax
  45. Pop!_OS
  46. PureOS
  47. Feren OS
  48. Q4OS
  49. Sabayon Linux
  50. Redcore Linux
  51. Ubuntu Budgie
  52. Peppermint OS
  53. Void Linux
  54. Elementary OS
  55. Deepin OS
  56. Manjaro Linux
  57. Solus
  58. Linux Mint
  59. MX Linux
  60. SparkyLinux
  61. openSUSE
  62. Knoppix
  63. Feren OS
  64. Endless OS
  65. TrueOS
  66. KaOS
  67. PCLinuxOS
  68. Puppy Linux
  69. ROSA Linux
  70. Tiny Core
  71. Lakka
  72. Porteus
  73. antiX
  74. Kodachi
  75. MakuluLinux
  76. Endless OS
  77. Clear Linux
  78. Regolith Linux
  79. ClearOS
  80. Devuan Linux
  81. Artix Linux
  82. OpenMandriva
  83. FreeNAS
  84. NixOS
  85. Calculate Linux
  86. Crux
  87. Raspberry Pi OS
  88. Linux Lite
  89. Bluestar Linux
  90. Elive
  91. DragonOS
  92. OpenELEC
  93. Funtoo Linux
  94. Parabola Linux
  95. Red Hat Enterprise Linux
  96. Scientific Linux
  97. SUSE Linux Enterprise
  98. Oracle Linux
  99. Mageia
  100. Alt Linux

        DOWNLOAD NOW

Post a Comment

0 Comments