🔹OpenVAS
🔹SQLMap
🔹Aircrack-ng
🔹Maltego
🔹OpenSSH
🔹Nessus
🔹Zed Attack Proxy
🔹Wireshark
🔹Metasploit Framework
🔹John the Ripper
🔹Nmap
🔹BurpSuite
🔹OpenVAS
🔹SQLMap
🔹Aircrack-ng
🔹Maltego
🔹OpenSSH
🔹Nessus
🔹Zed Attack Proxy
🔹Wireshark
🔹Metasploit Framework
🔹John the Ripper
🔹Nmap
🔹BurpSuite