UPDATED FOR 2020

Popular Hacker Tools & Software

Since 2014 we’ve listed the web’s favorite hacking/ pentesting and software hacker tools as used by hackers, geeks, ethical hackers and security engineers (as well as black hat hackers).

Thank you for stopping by!

Need Help? Ask A Question

Posted by Henry Dalziel  |  December 8, 2019  |   Questions / Comments 149

Popular Hacker Tools & Software
Updated for 2020 & Regularly Checked

Henry Dalziel
Henry Dalziel | December 8, 2019

- C|EH, Security+, MSc Marketing Management;
- Based in Hong Kong for the last five years;
- Cybersecurity Pro & Growth Hacker

TL;DR

We list the web’s most popular Hacking Tools and Hacking Software, and we’ve done so since 2012. “You’re Only As Good As Your Tools” so the saying goes. Well, in our constantly updated resource that’s exactly what we do.


SUMMARY OF THIS RESOURCE

This list and resource sprung to life when we organized an online poll way back in 2013 that was very well received and below are the recommended tools that you all voted as the ‘Top Ten Hacking Tools List’.

However, over time this list has significantly grown from being just another “Top 10” or “Top 20” post; instead, it evolved into more of an FAQ/Resource of how these tools may help you.

We’ve organized this list by including information and links to the specific tools with additional information pertaining to the individual tool which we hope will help you.

Whilst this list is touted as a “Top Ten” it is definitely virtually impossible to list only ten “best tools” because, of course, it is very much a subjective choice and decision to select which tools make this list.

If you’re not sure where to start then we’d recommend that you take a look at our index of hacking software tools located here that includes tools from the following hacking/ pentesting categories:

There are dozens of hacking tools being released and published every day so to organize all these programs and software is really quite a challenge. We’re going to be updating this list for 2020 to make it more “contemporary” and also to factor in more relevant tools.

Hacker Tools Categories

Helpful? Share The Love!

HOW DO WE RESEARCH THESE TOOLS?

I’ve played around with a lot of these tools and they’re all mostly mass-market commercial-grade pentesting, networking or forensic basic tools that are used by Cybersecurity Professionals for a variety of reasons.

There’s a ton of absolute classics in our list and this year, 2020, we want to make a special effort to include slightly more edgy tools such as L0rdix and other similarly focused nefarious items.

THE HISTORY OF “HACKING TOOLS” WITHIN IT SECURITY

Traditionally, the perception is that Chinese state hackers (PLA Unit 61398) take stock tools (like the ones listed within our directory) whilst the Russians and Israelis (Unit 8200) have the reputation of building their own customized tools. Tools are what’s needed to get the job done. The hacker tools listed within our site are commercially available and commonly used tools, all of which can (for the most part), be freely downloaded.

If you’re serious about a career within IT Security then we’d absolutely encourage you to become familiar with these tools.

Recommended Keylogging USB’s

Click here to see some amazing USB Keyloggers

These USB Keyloggers require NO drivers. Some are WiFi-enabled and others even email you the keystrokes. These are tools that every serious Pentester needs in their toolkit.


our recommended tools for 2020

If you are somewhat confused between John the Ripper vs THC Hydra then think of John the Ripper as an ‘offline’ password cracker whilst THC Hydra is an “online” cracker. Simple. They both have tremendous value and if you can crack learning them then you’ll be in an advantageous position for your career in 2020.

✓ Probably the best known and loved “Password Cracker”;
✓ Huge community (even StackOverflow will be good for support);
✓ Cracks literally every offline type of file

John The Ripper

Password Cracking Tool​

Cost of Tool: Free

Quite frankly – this is the coolest named tool out there: John the Ripper.

Often you’ll see it abbreviated as ‘JTR’. JTR is an awesome bit of hacking software that is designed to crack even highly complex passwords.

John the Ripper, mostly just referred to as simply, ‘John’ can be considered as being a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks.

John the Ripper takes text string samples (from a text file, referred to as a ‘wordlist’, containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks.


Sn1per is probably the most recently popular tool of 2020 and for good reason. It’s all an all-round OSINT/Reconnaissance hackers tool. Highly recommended.

✓ A majorly popular tool that is like a Swiss Army Knife;
✓ Rammed full of useful commands for your profiling;
✓ Very active community and developers updating the tool

UPDATE! We interviewed the developer of  Sn1per! To learn how (why!) he created the rapidly growing tool click here.

sn1per

WEB VULNERABILITY SCANNING TOOL​​

Cost of Tool: Free & paid

This tool is amazing.

We love it.

Sn1per is a vulnerability scanner that is ideal for penetration testing when scanning for vulnerabilities.

It’s a total pleasure to work with and it’s regularly updated.

The team behind the software, which is easily loaded into Kali Linux, has a free (community version) and a paid plan as well.

The tool is particularly good at enumeration as well as scanning for known vulnerabilities.

If you’re studying for the OSCP (which requires a ton of enumeration), we’d recommend that you get your head around using Sn1per.

We’d suggest using this tool in tandem with Metasploit or Nessus so that way if you get the same result then you definitely know that you’re onto something.


UPDATE! We interviewed the developer of THC Hydra. To learn how (why!) he developed his famous hacking tool click here.

✓ Total classic “Old School” Hackers “Hack” tool;
✓ Very likely the web’s favourite tool to hack WordPress;
✓ Versatile and robust syntax that gets the job done.

THC Hydra

Password Cracking Tool​

Cost of Tool: Free

We’ve purposely placed THC Hydra underneath John The Ripper because they often go ‘hand-in’hand’. THC Hydra (we’ve abbreviated to simply ‘Hydra’ throughout our site) is a hugely popular password cracker and has a very active and experienced development team.

Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP, SMB, VNC, and SSH. Take a look at John the Ripper as well.


This password cracking tool is old-school. It’s also excellent.

✓ Another classic tool loved by Pentesters;
✓ Actively updated and supported tool.

Cain and Abel Hacking Tool

Password Cracker/ Password Hacking​

Cost of Tool: Free

Cain and Abel (often simply abbreviated to Cain) is a hugely popular hacking tool and one that is very often mentioned online in a variety of ‘hacking tutorials’.

At its’ heart, Cain and Abel is a password recovery tool for Microsoft Windows but it can be used off-label in a variety of uses, for example, white and black hat hackers use Cain to recover (i.e. ‘crack’) many types of passwords using methods such as network packet sniffing and by using the tool to crack password hashes.

Cain, for example, when used to crack password hashes would use methods such as dictionary attacks, brute force, rainbow table attacks and cryptanalysis attacks.


Metasploit is probably the most famous tool in our opinion, probably because it has such a vibrant community, it’s absolutely well-maintained and also packs a ton of options with being able to deploy payloads into vulnerabilities.

A serious Penetration Tester should know how to use this Pentesting Tool inside-out. If you had to learn one tool to use in 2020 we’d definitely push you to learn Metasploit.

✓ The “mother” of all Hacker Tools;
✓ Gigantic resource of exploits just waiting to be used;
✓ A “must-learn” tool if you’re serious about becoming an Ethical Hacker.

Metasploit Penetration Testing Software

Vulnerability Exploitation Tool​

Cost of Tool: Free & Paid

The Metasploit Project is a hugely popular pentesting or hacking framework.

Metasploit, along with nmap (see above) and Wireshark (see below) and probably the ‘best known’ three hacker software tools out there.

If you are new to Metasploit think of it as a ‘collection of hacking tools and frameworks’ that can be used to execute various tasks. Also – we should also add that if you have never heard of Metasploit and are interested in getting into the Cybersecurity Industry, especially as a Penetration Tester, then this is a ‘must-learn’ tool.

Most practical IT Security courses such as OSCP and CEH include a Metasploit component.

Widely used by cybersecurity professionals and penetration testers this is an awesome piece of software that you really out to learn.

Metasploit is essentially a computer security project (framework) that provides the user with vital information regarding known security vulnerabilities and helps to formulate penetration testing and IDS testing plans, strategies and methodologies for exploitation.

There’s a ton of incredibly useful Metasploit information out there and we hope that the books that we’ve chosen go some way to help you on your journey, not least if you are a beginner just starting out and looking for beginners tutorials in how to use Metasploit.


This tool really is the Social Engineers tool of choice. This tool runs on intelligent software that can map out all connected social profiles. It’s a must-learn for any budding Security Professional.

✓ Actively supported;
✓ One of the main tools for Social Engineering hacks

Maltego

Digital Forensics Hacking tool​

Free & Paid

Maltego is different in that it works within a digital forensics sphere. Maltego is a platform that was designed to deliver an overall cyber threat picture to the enterprise or local environment in which an organization operates.

One of the awesome things about Maltego which likely makes it so popular (and included in the Kali Linux Top Ten) is its’s unique perspective in offering both network and resource-based entities is the aggregation of information sourced throughout the web – whether it’s the current configuration of a vulnerable router within a network or the current whereabouts of your staff members on their international visits, Maltego can locate, aggregate and visualize this data!

For those interested in learning how to use Maltego we’d also recommend learning about OSINT cybersecurity data procurement.


This is another old school classic.

✓ Supported by the mighty OWASP (i.e. these folks know a thing or two about web app security);
✓ Huge library of exploits and hacks.

OWASP Zed

Web Vulnerability Scanner​

Cost of Tool: Free

The Zed Attack Proxy (ZAP) is now one of the most popular OWASP projects. The fact that you’ve reached this page means that you are likely already a relatively seasoned cybersecurity professional so it’s highly likely that you are very familiar with OWASP, not least the OWASP Top Ten Threats listing which is considered as being the ‘guide-book’ of web application security.

This hacking and pentesting tool is a very efficient as well as being an ‘easy to use’ program that finds vulnerabilities in web applications. ZAP is a popular tool because it does have a lot of support and the OWASP community is really an excellent resource for those that work within Cyber Security.

ZAP provides automated scanners as well as various tools that allow you the cyber pro to discover security vulnerabilities manually. Understanding and being able to master this tool would also be advantageous to your career as a penetration tester. If you are a developer then you have it’s obviously highly recommended that you learn how to become very proficient with this ‘hacker tool!’


This tool is the mac-daddy of all network monitoring tools on the market today. It’s so big that there is even a conference dedicated to this tool!

✓ A hugely important tool that you must learn if you want to be an Ethical Hacker;
✓ A massive community so don’t worry about being able to ask questions and master this tool.

Wireshark

Web Vulnerability Scanning tool​

Cost of Tool: Free

Wireshark is a very popular pentesting tool and for over a year it was not included on our list, however, by popular demand, we added it in late June 2016 and it remains a constant fixture on our list, even in 2020.

It is difficult to place Wireshark in any specific category but in most cases it is used to monitor traffic.

Wireshark essentially captures data packets in a network in real time and then displays the data in a human-readable format (verbose). The tool (platform) has been highly developed and it includes filters, color-coding and other features that let the user dig deep into network traffic and inspect individual packets. If you’d like to become a penetration tester or work as a Cyber Security practitioner, then learning how to use Wireshark is a must.

There are a ton of resources out there to learn Wireshark, and, of particular interest, there’s also a Wireshark Certification which you can achieve and place on your LinkedIn profile.


The Aircrack suite is the defacto bad-boy toolkit for any Wireless Hacking Deployment. It’s a classic and spawned a generation of hackers on the Interwebs.

✓ Fantastically written efficient tools that work great;
✓ Not difficult to learn and easy to modify and tweak.

Aircrack-ng

Password/ wifi Cracking Tool​

Cost of Tool: Free

The Aircrack suite of Wifi (Wireless) hacking tools are legendary because they are very effective when used in the right hands.

For those new to this wireless-specific hacking program, Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking hacking tool that can recover keys when sufficient data packets have been captured (in monitor mode).

For those tasked with penetrating and auditing wireless networks Aircrack-ng will become your best friend. It’s useful to know that Aircrack-ng implements standard FMS attacks along with some optimizations like KoreK attacks, as well as the PTW attacks to make their attacks more potent. If you are a mediocre hacker then you’ll be able to crack WEP in a few minutes and you ought to be pretty proficient at being able to crack WPA/ WPA2. For those interested in Wireless Hacking we’d also highly recommend taking a look at the very awesome Reaver, another very popular hacking tool that alas we couldn’t add to our list.


Nmap is reliable and fascinating once you master it. There’s also a GUI version for those that don’t want to use the command line. A lot of other tools actually incorporate nmap (for example Metasploit) so you’ll have to learn it eventually. In fact – you’ll want to learn it because it is fun and of course provides the hacker with a lot of useful and actionable data.

✓ Iconic tool loved and used by millions (well, maybe not millions but definitely a lof of InfoSec folk);
✓ Easy to use and frankly, awesome!
✓ Extremely useful!

Nmap (Network Mapper)

port scanning Tool/ map networks​

Cost of Tool: Free

Nmap is an abbreviation of ‘Network Mapper’, and it’s very well known free open source hackers tool. Nmap is mainly used for network discovery and security auditing.

Literally, thousands of system admins all around the world will use nmap for network inventory, check for open ports, manage service upgrade schedules, and monitor host or service uptime.

Nmap, as a tool uses raw IP packets in creative ways to determine what hosts are available on the network, what services (application name and version) those hosts are providing information about, what operating systems (fingerprinting) and what type and version of packet filters/ firewalls are being used by the target.

There are dozens of benefits of using nmap, one of which is that fact that the admin user is able to determine whether the network (and associated nodes) need patching.

Nmap’s been featured in literally every hacker movie out there, not least the recent Mr. Robot series.


One of the cooler web applications hacking tools out there.

✓ Loyal hardcore community backed by first-class developers;
✓ Easy to use and fun once you get the hang of it.

Nikto Website Vulnerability Scanner

Website Vulnerability Scanner Hacking Tool​

Cost of Tool: Free

Nikto is another classic ‘Hacking Tool’ that a lot of pentesters like to use.

Worth mentioning that Nickto is sponsored by Netsparker (which is yet another Hacking Tool that we have also listed in our directory). Nikto is an Open Source (GPL) web server scanner which is able to scan and detect web servers for vulnerabilities.

The system searches against a database of over 6800 potentially dangerous files/ programs when scanning software stacks. Nikto, like other scanners out there, also scans for outdated (unpatched) versions of over 1300 servers, and version specific problems on over 275 servers. Interestingly, Nikto can also check server configuration items such as the presence of multiple index files, HTTP server options, and the platform will also try to identify installed web servers and web applications. Nikto will get picked up by any semi-decent IDS tool so its’ really useful when conducting a white-hat/ white-box pentest.

Certainly, a great tool to learn your skills when attacking an open box for training.


Some Of Our Other Content

You may also like...

USB Keyloggers
USB Keyloggers

Some of these USB Keyloggers work over WiFi and others even email you the keystrokes! Require NO drivers. Just plant and forget.

Blog Post

N00b Hacking
WiFi Hacking Hardware Devices
WiFi Hacking Hardware Devices

We take a look at hardware used by the pro's to hack into Wireless Networks! (Keyloggers, Deauth Tools, Alfa Scanner etc.)

Blog Post

WiFi Hacking
Mobile Encryption Apps
Mobile Encryption Apps

Is WhatsApp safe? What about Telegram? There are dozens of mobile encryption apps...

List Review

Cyber Hacking
Password Cracking Tools
Password Cracking Tools

John The Ripper, Crowbar, L0phtcrack, Medusa, Rainbowcrack, THC Hydra and more!

List Review

Cyber Hacking
Kali Linux Developers
Meet The Kali Linux Developers

Meet the folks behind the Hacking Tools that make Kali Linux so damn awesome

Blog Post

N00b Hacking
OSCP Advice
How Difficult is OSCP? Get expert advice from those that passed!

We've interviewed over 25 Cybersecurity Professionals to ask them that exact question...

Blog Post

N00b Hacking
How To Hack WordPress 2020
How To Hack WordPress 2020

In this (constantly updated) resource we investigate ways to Hack WordPress

Blog Post

N00b Hacking
Pass CEH First Time
Pass CEH First Time: we ask experts in the field

Are you interested in passing CEH? If yes, read on, we have a ton of advice to share

Blog Post

N00b Hacking

Summary

We’ve been managing this resource for many years now and its success is determined by all the contributions that our visitors have given us over the years.

Our Hacker Tools “How To” resource works like this: we try to answer all the “reasonable” questions we receive and the ones that are asked the most we include in our sticky FAQ below.

Many of the questions submitted to our resources are repeated and include how to access social media accounts like Facebook, Instagram, Pinterest etc. The truth is that doing so constitutes a crime, and besides, gaining entry through the front door (i.e. the login page) is never going to work. The “easier” method would be something like keyword logging or similar.

Warning!
Using penetration testing tools listed throughout our directory, which we’ve we updated for 2020 on someone else’s computer or network without permission is a crime and judges are increasingly happy to give you jail time. Tread with caution and always seek permission!

No Such Thing As A Stupid Question
We also get a ton of messages advertising their hacking skills and saying that you can hire them to hack a Facebook account (for example) – well, never trust them. Hiring some black-hat hacker will not work because, more to the point, how can you trust them?

However, having said that, we LOVE to hear from you so please drop us a question regarding anything related to our hacking tools resource and we’ll happily reply!

Previously Asked Questions (with Answers)

This is a great question and is asked dozens of times a month.

The easy and simple answer is, it depends.

The tools that we list are absolutely not illegal but they can still be used for nefarious gain.

Think of it like this: a gun can be used for good or bad. A peacekeeper can have a weapon that could be used as a last resort in defending themselves but their initial purpose of having a gun (or weapon) is to “do good”. Of course, the same gun could be used by a criminal or gangster so whilst the tools we list are mostly used by Cybersecurity Professionals, of course some nefarious individuals may indeed use these tools for illicit gain.

An example of an “illegal hacking tool” would be if it were designed to exploit a widely unknown zero-day vulnerability.

Throughout our directory we refer to “Hacker Tools” as being any form of software that is designed to identify and repair security vulnerabilities. The “tool” is only as good as its’ user so you can expect to generate instant results by just using these tools; rather, you need to understand the system or machine that you are either auditing or penetrating and also understand the vulnerability that you’ve been able to find using these tools.

Nope. Like anything you just have to dedicate time and patience. And – of course, owing to the nature of these tools it is highly recommended that you either seek permission on targets that you scan or attempt to penetrate, or better you create your own hacking lab.

The easiest way, and if you’re serious about learning how to use these security tools, is to install a Linux Operating System (‘Distro’) that ships with all these tools pre-bundled. The most popular of these Linux Distros in Kali Linux (which replaced “Backtrack”), Backbox and DarkArch. There are a bunch more which I’ll add to this sticky question over the course of the year.

The other way, of course, is to install these tools “one by one”.

The “best hacker tool” for the task you have at hand is difficult, subjective and may be totally opinionated.

What we do here at Concise Courses is to list the most popular tools and software that are used by security professionals (like Penetration Testers) in the industry.

As ever, your mileage will differ. The best practice is to try several tools when engaging a security audit job or other. That way, if your results keep producing the same result then you can confirm your discovery or the vulnerability for example.

Absolutely yes.

We have another three categories lined up, plus a bunch of improvements, tutorials and other information.

You need to learn how to code.

Python is the recommended language to use when scripting automation. You’ll likely have to use existing API’s for resources such as pinging “whois” data and geo-coordinates. The other thing you can do of course is to fork existing codebases on GitHub and have a play around yourself to see how it was built.

In fact, we have a resource in which we’ve interviewed dozens of developers that have scripted, coded and promoted their tools. Many of these tools ship with Kali Linux, Backbox and Parrot OS.

149 responses to “Popular Hacker Tools & Software”

  1. Rushikesh says:

    How to install nmap in android phone

    • The easiest and best way would be to install FING; it’s a great tool that works great and tells you what is on the network using your iOS or Android. Here’s the link.

    • Mindlexx says:

      If you want to learn the command line interface version install Termux and install the package using the “apt-get install” command. It is worth noting for educational purposes the Termux application makes use of the Linux kernal that lies at the root of every Android operating system. If you don’t know basic Linux commands there are many (free) resources online. Additionally, if you would like complete control (change Mac address etc.) It is highly advisable to root your Android device.

      Disclaimer: What you do, and how you use your device is not my business. I hold zero liability. In absolutely no way is the above information telling you that you should root your device. Unlocking the bootloader or flashing a custom recovery and/or custom ROM can void the manufacturer warranty, sometimes just unlocking the bootloader alone will void the warranty. Even worse, if rooting is preformed by an nexperienced individual the process can “brick” the device. Rendering it useless. Use this information at your own risk.

    • K.shivakumar says:

      Go to play store and search the app name then you see install option next app installed

  2. Antonio says:

    Hi, Henry. Can you trace an IP address / location via a mobile call? Maybe can send them some files to open up?

  3. Zeeshan says:

    first download termux app from playstore and open it and type pkg install nmap

  4. Armaan Singh says:

    hello henry can you tell the main use of hacking tool

    • The main use of hacking tools is to make life easier for a Pentester/ Professional Cybersecurity Practioner. Tools are designed to make it more efficient to find and patch vulnerabilities (for example). Remembering that time is money, the cost of hiring a professional Penetration Tester (again, for example) can be extremely expensive so typically the tools listed on this site will be used in tandem to prove that there is indeed a known vulnerability.

      The tools listed throughout this site are commercial and used by professional cybersecurity professionals, but, just like anything else, they can be used for “good” or for “bad”.

      A hardware store sells a hammer that they imagine will be used to hammer nails. That same hammer could be used in a violent attack which of course was not the purpose of that tool – and the same thing can be said for the pentesting tools that we list within our resource.

    • Stuartworth says:

      Can I learn more?

  5. Waqar says:

    Hi Henry can u pls tell me which is the best software for hacking phones by giving them fake hot spots?

    • Wow! Great question. The honest answer is that I haven’t tried it but I’d love to when I get the time. The concept is called “evil twin attack” and the “recommended tool” that I really ought to add to the wifi cracking list is called “wifiphisher”. If anyone has any comment or suggestion I’ll post their recommendation here.

  6. Yadnesh Koli says:

    How do I hack a wifi password?

  7. Viola says:

    Super Website. Vielen Dank.

  8. Zed says:

    Hey Henry, About Wifiphisher, according to me, it is very easy to successfully hack a WiFi password without actually having to deal with loads of passphrases in word-lists or cracking. Because essentially Wifiphisher creates a fake access point which the target uses to input the password of the WiFi network and it is then displayed on your screen.

    • Hi Zed – really appreciate your comment. Totally agree, Wifiphisher is a smart WiFi Hacking Tool and one we should all have a play with. Evil Twin Attacks and Rogue Access Points are all equally fantastic Wireless hacking TTP’s we should all get to know.

  9. Aum says:

    where to buy the program Atrax

  10. Jiedornciey says:

    I know nothing and I want to know everything, I don’t even know from where to start. I love the way you are sharing ideas guys.

  11. vijay says:

    Hi, Henry, can a phone be cloned with a simple malicious SMS and hack the data in it.

    • Hi Vijay, I can’t see why not. The two things you need are the IMSI number (which is similar to the IMEI number of a phone) and the authentication key. That’s it. Regarding placing a malicious script I’ll leave that to our friends in the underworld.

  12. Does the hacking tools listed above need kali linux to run? What hacking tools can be used with little or no cyber security knowledge?

    • Nope. Hacking tools do not need to run on ‘Kali Linux’; they can work on most platforms but developers tend to create software penetration tools (and other forensic hacker tools listed in this resource) because they allow for more flexibility and can be easily forked on GitHub and worked on in tandem with other developers. Kali Linux is just convenient, that’s all. The developers of Kali have bundled a ton of useful tools (including repo’s) for your convenience so it just works out of the box. Other distro’s you might be interested in is BackBox, Parrott OS and BlackArch.

      Regarding the second part of your question – yes and no. If you understand exactly what it is that you are trying to achieve using these hacker tools then it will surely help you along your way.

  13. agathiyan says:

    What are some pentesting tools to hack a mobile phone and access the data?

  14. shubham says:

    Hi Henry! how can I become a successful hacker? From where I should start? I have read about red hat black hat grey hat and many more.

    • Hi Shubham – everybody has to start somwhere! Take a look at PenTest Academy, Cybary and a few other similar sites like that. Also! You might be interested in another of our resources called: “Breaking Into Cybersecurity” which is an interview resource. I interviewed over 50 Penetration Testers (“Ethical Hackers”) and Digital Forensic professionals to ask how they got started in Cyber Security (IT Security) and some of their replies are pretty interesting. Bottom line: you can do it! Good Luck!

  15. Jalia Hills says:

    Hello, Henry, By having someones email address, can i get his or her unknown email address that is being used at that time.

  16. agathiyan says:

    most of the tools r hard to be downloaded in windows pc can u send me the links of all tools above please?

  17. Abdul T Kargbo says:

    Can you please send me the links to the hacking software please?

  18. Julian says:

    Is it possible to clone a phone as done in movies where it’s like mirroring the targeted phone to the one I’m using to monitor it? If so can it be done using a different make and model of phone or does it have to he the exact same? Also can the software be installed remotely in any way and which way or ways would that be? Thanks

  19. xhibhit says:

    How do i download any of the hacking tools to my system?

  20. Gabriella says:

    I am writing a screenplay where my protagonist (the good guy) is a hacker and uses her skills against the antagonist to seek revenge for killing her mother and destroying their home. What I am looking for is someone who can help me with the methodology and terminology of hacking so that if someone like you sees the film it looks and sounds authentic. This isn’t a movie about the art of hacking rather hacking is used as an end to a means. Do you know someone in the world of hacking that would be willing to speak to a non-hacker and help me realistically portray it on the screen.

    • I’ve published your comment in case someone wants to jump in and help out. Whoever is interested please reply to this message and message me privately and I’ll connect you with Gabriella.

  21. Domz says:

    How do I export a .cap file in order to use in Aircrack-ng???

  22. h404 resource says:

    how can i use ophcrack henry?

  23. Ishu says:

    I want to target all the pc’s which are connected on same WiFi network can you please guide me how can i do it and can i do it on windows or i have to install Linux… if possible plz provide me full guide 🙂

  24. Shadrack says:

    Thank you Henry for your educating and informative post. I am new to practical Hacking but have read a lot about cybersecurity. I shall exploit some of the resources here to improve my skills. I would like to know if it is advisable to use my laptop with critical data to install Kali for ethical hacking activities.

    • You are welcome. Thank you for your comment and good luck with it all! Regarding your question: “I would like to know if it is advisable to use my laptop with critical data to install Kali for ethical hacking activities” – I’d say no. Why would you have critical data on the same install as a machine designed for Penetration Testing? The main issue is that Kali Linux is meant to be run as r00t and as such it could be prone to be compromised. The ‘best way’ to use Kali Linux, in my view, is to flatten it after every engagement. Simple start with a fresh install. The solution in your instant is to dual-boot using Grub. Good luck!

  25. jack says:

    What is the best software to hack any shopping site and hotel booking site to hack credit card info?

    • Assuming that you referring to testing the security of your own website applications I’d start with the basics and see whether there are any unpatched and known vulnerabilities. For this the best place to start ought to be the OWASP Top Ten Project and test variations of hacks. It all depends on the ecommerce platform. Hacking WooCommerce for example is possible but I’d imagine relatively rare because of the amount of developers working on the project. Extracting Credit Card information via a hack is another discussion: you’d need to set up a sniffer on the network or create a dummy login page or payment page etc. There are a dozen different ways but as ever, do is safely and only on your own systems and networks.

  26. Sam says:

    Hi Henry,
    Gotta hand it to you, ie: answering ALL questions without being sardonic, arrogant or condescending. One thing I must point out is that the Cyber field is full of specialties, one can start the journer of become a hacker by starting to understand IP protocols, set up their own pen testing labs, download and understand the necessary tools for whatever it is that they are pursuing. I’ve tried to do all that and quickly sink into a quagmire of options but your posts are helpful and to the point.. Kudos to you, Henry.

    • Wow Sam – thank you for your comment! Sure thing. I know how it goes – there is way too much arrogance in the Cybersecurity field. Everyone had to start somewhere. Hope all good with you and thanks again for taking the time to write.

  27. shaggy says:

    Hi Henry, I wanted to know if there’s an app that can hack Instagram

    • Not that I know of! It depends what you really mean by your question. “Growth Hacking Instagram” is totally doable to milk content and traffic but in terms of being able to “Hack Instagram Passwords” and all that I’d say that good old OSINT, Social Engineering and Guess Work is your best bet.

  28. Linux User says:

    Thank you for this post.

  29. Hack News says:

    Hydra is still one of the most powerful tools on the web and I like Sn1per too, even as a fan of Nikto.

  30. Hosam says:

    Thank you for the content you’ve provided. I’d like to ask you: how do I crack the password for router or router VoIP?

  31. Muhammed says:

    Hi I want to download the best password hacking app

  32. Meshack says:

    Can I hack using Windows or must I use Kali Linux?

    • You can use anything you want. Unauthorized access can even be done wearing a high visibility jacket and gaining access to a building. The benefit of Hacking with Kali Linux is that the OS ships with all the tools you could possibly need. That’s it. That is the main benefit of using Kali Linux: it saves you a bunch of time to having to download, install and update all the necessary tools.

  33. Ninja says:

    Hey there can u help me, I have a problem with hydra

  34. Aayush says:

    I want to start learning more on cyber security and pen-testing as I am a beginner so sir can u plz give me a link on the same, and also I really appreciate your efforts and work 🙂

    • You are VERY welcome Aayush and good luck with it – you WILL do it. Perhaps start with Cybary, Pentester Academy and of course, although this is obvious YouTube really is your friend with this subject matter. I’d also suggest that you specialize immediately and focus in on what really interests you – for example – is it digital forensics? Or perhaps SCADA/ ICS etc. Find a niche and excel at it.

  35. Marzuki says:

    Hi, Henry I still haven’t received any reply on my inquiry to you that I sent a few weeks ago.

    Appreciate your advice asap especially when WhatsApp has released official news regarding the PEGASUS Spy agency using it for mobile spy tools which affect billions of user worldwide.

    [Full Article Here]

    Kindly advice which tools to use to detect that kind of keylogger for Android phone. Thanks

    • Hi Marzuki

      Really appreciate you taking the time two write in and share that. There are plenty of tools out there to remove “Pegasus Spyware” but I’d place the focus on ditching WhatsApp and going with other mobile app messaging encrypted tools like we’ve got listed here. Other (better) user-to-user encrypted messaging tools include: Telegram, Wickr, Signal, Surespot, Silent Circle, Viber and Threema.

      Thanks again for sharing and giving us your thoughts.

  36. qpinx says:

    Hi Henry, i want to have knowledge over hacking credit card

    • I really hope that you learn the knowledge on how to “hack credit cards” so that you can defend against fraud and become an expert Cybersecurity Digital Forensics Expert! Learn to be bad to be good and for an exchange of your hard work and commitment to the Cybersecurity Industry, you’ll earn a ton of money in the process. There’s a massive demand for InfoSec Professionals

  37. raajeshwaran_y says:

    Hi Henry, I want to hack an instagram account. Which is the best hacking tool that is capable of hacking an instagram account to get the password of it? I already used Kali Linux for hacking Instagrams account but its failed. Can you tell me the perfect hacking tool to hack instagram account?

  38. Ken says:

    How can I hack WhatsApp account without the mobile I want to hack?

    • The short answer is: I don’t know – but a quick Google search for “Hack WhatsApp Account” generates dozens of tools and tricks – but I’ll leave that to your imagination. Good luck and be careful – hacking WhatsApp accounts is illegal and we certainly do not recommend doing it.

  39. Syed says:

    How to make PC look like a hackers one

  40. Richie DC says:

    I hope this app can run on an android phone

  41. niel patel says:

    kali linux or parrot os ? any suggestion pls !

  42. Ehis says:

    Hi Henry, I installed near on my Android device but I have no root permission, so what should I do?

  43. Hitla says:

    Hi Henry, your ideas are really awesome though i dont have deep knowledge on hacking but information provided above is really useful.

  44. miller says:

    Hello Henry , please do you know how to install Gopish … i really need this help . i have all the binary files install . i dont know how to run it on MAC OS…..

  45. Aakash says:

    Hi Henry, how i can hack a instagram account?

    • Good question – but very vague. Are you referring to being able to brute force your way into an Instagram Account?

    • Noob_hacker_007 says:

      It depends on you to choose which method have to use to hack insta*………it can be hacked by many methods like brute force, phishing, keylogging, reverse engineering, MITM Attack or by spying the victims mobile……..! 🙂

  46. Junel says:

    Hi Henry can I ask a question how to hack my stolen laptop?

  47. rahath says:

    Hi Henry, how can I find the location of a mobile device using their phone number (the location should be accurate) can u tell me which tool can help me?

    • Noob_hacker_007 says:

      I’ll recommend you to use geolocation tool provided by Linux!! In this tool, you can trace location of mobile by its IP address, phone number, mail …….! 🙂

  48. Frank says:

    Hello Henry,

    Can you refer me to a good phishing email sender that can go into office 365 inbox

  49. Hudaii says:

    Which hacking tool is the best to gain PC Control?

  50. Nurillo says:

    Hi guys. Can i hack wi-fi? which app you advice?

  51. Noob_hacker_007 says:

    Thnx Henry, I get a lot of information from your post …..as you know information is the wealth …..! Keep posting posts like this it can help to many script kiddies to get knowledge about hacking.

  52. Chris says:

    I’d really appreciate if you could share some thoughts about findsubdomains.com. This is a new for subdomain enumeration and i haven seen any extended comments from pros. so it would be cool if you could make some review (mb make comparison with other tools)

  53. Seb says:

    Really nice and comprehensive article. Wealth of information. May be useful one day you never know. How to bypass rate limiting? Like Wordfence for example?

  54. shedrack yusuf says:

    do hacking tools work with all kinds of languages

    • Good question – and the answer is yes. By languages, I assume you are referring to computer languages? There are only a finite amount of languages out there and the hackers have devised scripts and tools to be able to hack into most common applications.

  55. Pankaj says:

    Hello, Henry!
    Is that possible to crack the verfication code or to bypass it by using hacking tools?

  56. ENIOGO says:

    Hello Henry, please I need a recommendation on how to get BRUTE software for hacking, I have searched and searched but it all proves futile… I only need the BRUTE mainly for this work, I will definitely appreciate if you can refer or tell me how to get it…

  57. Sandy says:

    Hi Henry, please tell how to hack online games like -cash, cargo, metel and gold (game name – MAFIA CITY). Please tell me!

  58. Mike says:

    Hi Henry! Can you tell me how to hack Instagram by brute force attack, just to recover my old password???

    • Proceed with caution when saying you want to “Hack Instagram” – if anything you can lear now their defenses work so that you can deploy protective measures within your own system. Also, more to the point, Instagram will block Brute Force because the noise it creates is very obvious and the signal is to close access to that IP.

  59. Munashe says:

    How do I install Kali Linux on a partition volume disk and so that it does not affect my system bios when I try to switch back to windows

  60. Sebastien says:

    Hi Henry and thank you for all the information.

    I want to be a professional pentester ( a certified one ) and to do so, I started learning on the internet about Metasploit and Nmap. However, in all the courses, they always show simple examples of scanning and almost never show the process of exploit and the post exploit. Can you suggest me any course online that offers all steps in detail so that I can grasp the practicality and real-world pentesting? And also what do you consider the best (online preferably) certification to have for such title (pentester or security expert).

    Thanks again for all the time you put into this.

    • Hi Sebastien – you are more than welcome! You’re doing the right thing by learning those tools. The decision you need to make is whether you are seeking professional certification when it comes to your knowledge and learning. I’d advise that you do. Perhaps study for the OSCP, that would be my advice.

  61. Priyanshu says:

    Thanks for sharing. It is very helpful to me and also informative for all those users who will come to read about hack tool and software.

  62. James says:

    How can I download and install these hack tools??

  63. Crystal says:

    I am confused. How do I know if the hacking tools I have just downloaded are not trojans or malware? How can you trust them?

    • Great Question. The answer is really twofold. Firstly, go ahead and only install these tools in a virtual or containerized environment. Secondly, these tools are being used by the Professional Cybersecurity Community, they all have a long legacy and support community and network. The tools are used typically by network engineers and pentesters as well as digital forensics etc.

  64. Sam says:

    Hi, please can you help me download coinkanon? It software for generating bitcoin.

  65. reyan says:

    hi Henry what hacks can be done by having IP Adress of someone?

  66. Haripriya says:

    Hey, just wanna know if this hack tool is useful for undergrad students?

    • Henry Dalziel says:

      Which hacker tool are you referring to? All of the software listed above these questions are considered “useful” for EVERYONE, not just undergrads. Mostly these tools are used by Professionals within the Cybersecurity space. Let me know if that answers your question.

  67. Furyan says:

    I want to learn to hack

  68. Mark Monger says:

    I want to be a good and smart hacker, how can my dream come to pass

  69. Dada says:

    I need the name of a website to buy tools!

    • Henry Dalziel says:

      No need – they are all listed above or you just need to search for what you need. GitHub is your best bet. The paid tools (that are used for research and professional reasons) are basically just updated more often, have support and are designed to be more user-friendly (“idiot-proof”) than the paid Linux command-line tools.

  70. Lucifer says:

    Can you please explain how to access dark web /deep web?

Leave a Question or Comment:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.