Vulnerability Scanners Niche-specific hacker tools

Top Ten Hacking Tools of 2016Linux Pentesting (Hacking) Distros

This is our recommended list of “Vulnerability Scanner” hacker tools that a professional pentester (penetration tester), ethical hacker, digital forensics or cybersecurity enthusiast should know how to use effectively. We regularly update this list so please let us know if there is a hacking tool you’d like us to add!

Five most common uses for Vulnerability Scanning Tools

  • Scan your network or system (such as a computer, server or router) and identify open ports.
  • Scan for active Internet Protocol (IP) addresses and log-ons.
  • Scan clients operating systems, software and services that are installed and running.
  • Scan for known vulnerabilities from constantly updated databases such as CVE, OVAL, OSVDB or the SANS Institute/ FBI Top 20.
  • Scan virtual machines, BYOD mobile devices and or your or client databases.