Most used hacking methods and tools
Methods
1. DDoS
2. Forensics
3. Programming
4. Exploitation
5. Phone Hacking
6. Server Hacking
7. Client Hacking
8. Website Hacking
9. Network Hacking
10. Wireless Hacking
11. Reverse Engeenering
12. Information Gathering
1. MDK3
2. LOIC
3. HULK
4. DDOSIM
5. Ufonet
6. Hping3
7. Xerxes
8. Hammer
9. Slowloris
10. Websploit
11. GoldenEye
12. Metasploit
13. Aireplay-ng
14. Slowhttptest
1. COFEE
2. Volafox
3. Autopsy
4. Foremost
5. Hashdeep
6. Binwalk
1. Notepad++
2. Visual Studio
3. Text Editor
1. Metasploit
2. Sqlmap
3. Core Imact
4. W3af
5. BeEF
6. Dradis
1. Metasploit
2. Apktool
3. Droidjack
4. AndroRAT
5. Spynote
1. SQLmap
2. Jsql
3. Havij
4. Hydra
5. Metasploit
6. Armitage
7. Brupsuite
8. Owasp-ZAP
9. Invicti
10. Acunetix
11. OpenVAS
1. Darkcomet
2. FatRat
3. Veil-Evasion
4. Shallter
5. Unicorn
6. Setoolkit
7. Armitage
8. BeEF-Framework
9. EmPyre
10. FakeImageExploiter
11. Pupy
12. DFU-Programmer
13. Cobalt Strike
14. Exploitpack
15. Gcat
16. Crowbar
1. Sn1per
2. Owasp-ZAP
3. Brupsuite
4. Invicti
5. Acunetix
6. SQLmap
7. Xsser
8. WPScan
9. Joomrra
10. Joomscan
11. WPSeku
12. XSStrike
13. Kadimus
14. jexboss
15. CMSmap
16. brut3k1t
17. 0d1n
18. CloudFail
19. Arachni
20. Nikto
21. Webscarab
22. Nmap
23. Vbscan
24. Sentry MBA
1. MITMf
2. Bettercap
3. Ettercap
4. Tcpdump
5. Wireshark
6. Driftnet
7. SSLstrip
8. Armitage
9. Metasploit
10. Xerosploit
11. Sparta
12. Hydra
1. Wifite
2. Airodump-ng
3. Aireplay-ng
4. Wash
5. WiFi Pumpkin
6. Wifiphisher
7. Fluxion
8. Infernal Twin
9. WPSpin
1. OWASP-ZSC
2. OllyDBG
3. Apktool
1. OSINT Framework
2. CheckUserNames
3. HaveIbeenPwned
4. SecurityTrails API
5. Censys
6. Wappalyzer
7. Google Dorks
8. Maltego
9. Recon-Ng
10. theHarvester
11. Shodan
12. Jigsaw
13. SpiderFoot
14. Creepy
15. Nmap
16. WebShag
17. OpenVAS
18. Fierce
19. Unicornscan
20. Foca
21. ZoomEye
22. OWASP Amass
23. IVRE
24. Metagoofil
25. Exiftool
Reference
https://www.facebook.com/groups/494596534740263/permalink/1450358332497407/