
The golden penetration standard distro. Kali is my favorite choice when it comes to reliability, support and documentation.

My most important tool on the list and my eye inside the network. Its capabilities have stood the test of time as being one of the essentials in cyber security.

A great tool for analyzing network traffic and inspecting packets and requests on a molecular level.

The go to proxy for intercepting web traffic, requests and every interaction between the host and the web application.

The famous Rapid7 framework for exploitation with tons of exploits that are well maintained and updated.

A robust tool that relies on GPU power to crack hashes in no time, personal favorite of mine.

Hydra is a tool for brute forcing literally anything from network protocols to login pages, its strong suit is the capability of multi threading and swiftness.

An absolute must have for any network penetration tester as it interacts with lots of protocols and has a plethora of options to compromise the whole network.

You can not go wrong with BloodHound when it comes to Active Directory mapping and visualization.

The ultimate post exploitation shell since it interacts with windows systems through Windows Remote Management.

A vulnerability scanner geared towards web servers, its very accurate in detecting law-hanging fruits and outdated software.

The industry command line tool standard for transferring data through various network protocols.