Exploitation Tools
These tools are used to exploit different systems like personal computers and mobile phones. These tools can generate payloads for the vulnerable system and through those payloads information from the devices can be exploited. For example, the Victim’s system is compromised using payloads over internet or installing it if physically accessible. Some of the tools are:
- Armitage
- Metasploit
- Searchsploit
- Beef xss framework
- termineter
- Social engineering toolkit(root)
The most famous tool is Metasploit (there are courses to learn Metasploit alone). Go to “Applications” then in “Exploitation Tools”, you will find these tools.
Kali Linux Tools
Kali Linux is a Linux based operating system, mostly used in penetration testing. Kali.org has recently released its new update with some extra functionalities. There are different types of tools that are present in Kali Linux to perform different operations.
Types of tools in Kali Linux
- Information Gathering
- Vulnerability Analysis
- Web Application Analysis
- Database Assessment
- Password Attacks
- Wireless Attacks
- Reverse Engineering
- Exploitation Tools
- Sniffing and Spoofing
- Post Exploitation
- Forensics
- Reporting Tools
- Social Engineering Tools