Skip to main content

Available tools

Pentest-Tools.com provides security tools organized into categories based on their purpose. For a conceptual overview of what tools produce and how they fit into the testing workflow, see Tools.

Tool categories

Web reconnaissance

ToolDescription
Google HackingFind exposed data using Google dorks
Website ReconFingerprint web technologies
URL FuzzerDiscover hidden paths and files
WAF DetectorIdentify web application firewalls
People HunterDiscover email addresses and social media profiles

Network & cloud reconnaissance

ToolDescription
Domain FinderDiscover related domains
Subdomain FinderEnumerate subdomains
Virtual Hosts FinderDiscover virtual hosts on servers
Port ScannerIdentify open TCP and UDP ports

Web vulnerability scanners

ToolDescription
Website ScannerWeb application security testing
API ScannerTest REST and GraphQL APIs
WordPress ScannerWordPress-specific vulnerabilities
Drupal ScannerDrupal-specific vulnerabilities
Joomla ScannerJoomla-specific vulnerabilities
SharePoint ScannerSharePoint security testing

Network scanners

ToolDescription
Network ScannerNetwork infrastructure assessment
Password AuditorTest for weak credentials
SSL/TLS ScannerAnalyze SSL/TLS configuration
Cloud ScannerCloud infrastructure security
Kubernetes ScannerKubernetes cluster security testing

Offensive tools

ToolDescription
SniperAutomated exploitation framework
SQLi ExploiterExploit SQL injection vulnerabilities
Subdomain TakeoverDetect subdomain takeover risks

Exploit handlers

ToolDescription
XSS ExploiterCapture XSS payload executions
HTTP Request LoggerCapture OOB HTTP callbacks

Utilities

ToolDescription
ICMP PingTest host reachability
WHOIS LookupDomain registration lookup