• Home
  • about
    • About me
    • About Trojent
  • services
    • network pentest
    • Active Directory Pentest
  • info
    • Penetration Testing
    • Methodology
    • Tools of the trade
  • contact
    • e-mail inquiry
    • whatsapp inquiry
  • TryHackMe
    • Res
    • HeartBleed
    • Dodge
  • More
    • Home
    • about
      • About me
      • About Trojent
    • services
      • network pentest
      • Active Directory Pentest
    • info
      • Penetration Testing
      • Methodology
      • Tools of the trade
    • contact
      • e-mail inquiry
      • whatsapp inquiry
    • TryHackMe
      • Res
      • HeartBleed
      • Dodge
  • Home
  • about
    • About me
    • About Trojent
  • services
    • network pentest
    • Active Directory Pentest
  • info
    • Penetration Testing
    • Methodology
    • Tools of the trade
  • contact
    • e-mail inquiry
    • whatsapp inquiry
  • TryHackMe
    • Res
    • HeartBleed
    • Dodge
Trojent

We are live!

We are live!We are live!

Tools of the trade

Kali Linux

The golden penetration standard distro. Kali is my favorite choice when it comes to reliability, support and documentation.

Nmap

My most important tool on the list and my eye inside the network. Its capabilities have stood the test of time as being one of the essentials in cyber security.

WireShark

A great tool for analyzing network traffic and inspecting packets and requests on a molecular level.

BurpSuite

The go to proxy for intercepting web traffic, requests and every interaction between the host and the web application.

Metasploit

Metasploit

The famous Rapid7 framework for exploitation with tons of exploits that are well maintained and updated.

Hashcat

Metasploit

A robust tool that relies on GPU power to crack hashes in no time, personal favorite of mine.

Hydra

BloodHound

NetExec

Hydra is a tool for brute forcing literally anything from network protocols to login pages, its strong suit is the capability of multi threading and swiftness.

NetExec

BloodHound

NetExec

An absolute must have for any network penetration tester as it interacts with lots of protocols and has a plethora of options to compromise the whole network.

BloodHound

BloodHound

BloodHound

You can not go wrong with BloodHound when it comes to Active Directory mapping and visualization.

Evil-Winrm

Evil-Winrm

BloodHound

The ultimate post exploitation shell since it interacts with windows systems through Windows Remote Management.

Nikto

Evil-Winrm

Nikto

A vulnerability scanner geared towards web servers, its very accurate in detecting law-hanging fruits and outdated software.

CURL

Evil-Winrm

Nikto

The industry command line tool standard for transferring data through various network protocols.


Copyright © 2026 Trojent - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept