Hacking Tools: Useful Hacking Tools to Use on GNU / Linux

Hacking Tools: Useful Hacking Tools to Use on GNU / Linux

Hacking Tools: Useful Hacking Tools to Use on GNU / Linux

Continuing with our publications from Hacking theme, today we will address in a little more detail the point of Hacking Tools. In order to do so, get to know some of the best and best known software tools created for the work environment of professionals and passionate about the «Hacking & Pentesting ».

In addition, it is noteworthy that said Hacking Tools can be perfectly used both by those who practice the "Ethical Hacking" as for those who do not.

Ethical Hacking: Free and open applications for your GNU / Linux Distro

Ethical Hacking: Free and open applications for your GNU / Linux Distro

For this opportunity, and before entering fully into the subject, we will leave below some links to previous publications related to the subject hacking, so that those interested in delving into the subject can do so easily.

"Why Hack on GNU / Linux? Because it is well known that professionals in the area of ​​"Hacking & Pentesting" prefer GNU / Linux over Windows, MacOS or other, for their professional work, since, among many things, it offers a greater amount of control over each element of it. Also, why is it so well built and integrated around your Command Line Interface (CLI), that is, your terminal or console. In addition, it is more secure and transparent because it is free and open, and because Windows / MacOS is usually a more attractive target." Ethical Hacking: Free and open applications for your GNU / Linux Distro

Ethical Hacking: Free and open applications for your GNU / Linux Distro
Related article:
Ethical Hacking: Free and open applications for your GNU / Linux Distro
Hacking and Pentesting: Adapt your GNU / Linux Distro to this IT field
Related article:
Hacking and Pentesting: Adapt your GNU / Linux Distro to this IT field
Hacking: It is not only doing things better but thinking better about things
Related article:
Hacking: It is not only doing things better but thinking better about things
Free Software and Movement Hackers
Related article:
Related Movements: If we use Free Software, are we also Hackers?

Hacking Tools: Best Hacking Tools for Linux

Hacking Tools: Best Hacking Tools for Linux

3 of the best known, complete and used Hacking Tools they are usually the following:

Hack Tool 1: Metasploit

It is considered the penetration testing framework most used in the world. Metasploit is the product of a collaboration between the open source community y Rapid7. It helps security teams do more than check for vulnerabilities, manage security assessments, and improve security awareness; train and arm defenders to always stay one step (or two) ahead.

To download, install and use go directly to the following link. And for additional information the following link.

Hack Tool 2: Tool-X

It's a hacking tools installer coming from Kali Linux. Tool-X is developed for Termux and other Linux-based Operating Systems. Tool-X you can install more than 370 hacking tools about Termux and various Linux-based Distributions, such as Ubuntu and Debian, Entre otras muchas.

To download, install and use go directly to the following link.

Hack Tool 3: Onex

It is a package manager for hackers. Onex manages over 370 hacking tools that can be installed with a single click. In addition, it is a light and fast tool, very similar to Tool-X, so it can be used instead of Tool-X.

To download, install and use go directly to the following link.

14 more Hacking Tools

While others Hacking Tools Similar and just as useful are:

  1. EagleEye: Social Engineering Toolkit to obtain information from people on the Internet.
  2. fsociety: Penetration Testing Framework and Hacking Tool Suite.
  3. GoGhost: High-performance open source tool for massive SMBGhost browsing.
  4. HackingTool: All-in-one Hacking Tool for Hackers.
  5. hacktronian: All-in-one Hacking Tool available for Linux and Android.
  6. Nexphisher: Advanced phishing tool for Linux and Termux.
  7. sigit: Simple Information Gathering Toolbox.
  8. SocialBox: Brute force attack framework for some social networks.
  9. SQLMap: Automatic SQL injection and database takeover tool.
  10. TEA - Ssh-Client Worm: Worm ssh-client made with the TAS framework.
  11. Telegram-Scraper: Tool to obtain information from users of Telegram groups.
  12. udork: Google search script to obtain sensitive information from files or directories, among other functions.
  13. Web Hacker's Weapons: Cool Toolkit Used by Web Hackers.
  14. zphisher: Automated phishing tool.

Extra links about Hacking Tools

To expand this small list of Hacking Tools and other similar ones from Informatic security, which are usually cross-platform or for Windows and Android, you can visit the following links:

Generic image for article conclusions

Conclusion

We hope this "useful little post" about some of the best and most popular software tools known as «Hacking Tools», which are specifically created for the work environment of professionals and passionate about the «Hacking & Pentesting »; is of great interest and utility, for the entire «Comunidad de Software Libre y Código Abierto» and of great contribution to the diffusion of the wonderful, gigantic and growing ecosystem of applications of «GNU/Linux».

For now, if you liked this publicación, Do not stop share it with others, on your favorite websites, channels, groups or communities of social networks or messaging systems, preferably free, open and / or more secure as TelegramSignalMastodon or another of Fediverse, preferably.

And remember to visit our home page at «DesdeLinux» to explore more news, as well as join our official channel of Telegram from DesdeLinuxWhile, for more information, you can visit any Online library as OpenLibra y jedit, to access and read digital books (PDFs) on this topic or others.


2 comments, leave yours

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   they serve us said

    Such a tool is useless if you do not know how to use it and if you do not link to courses or manuals or better yet, you give detailed courses on them, because they are useless.

    1.    Linux PostInstall said

      Greetings, Nosirve. Thanks for your comment. We hope little by little to be able to address each one of them to deepen their download, installation and use. Anyway, thank you very much for your kind suggestion.