InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Member-only story

Must-Have Tools For Hacking

c0d3x27
InfoSec Write-ups
Published in
3 min readJan 10, 2022

Photo by ThisisEngineering RAEng on Unsplash

I t doesn’t matter what type of job you do. Tools are a big part of it. If you are an old follower of my work, you already know what I do for a living. If this is your first time reading my work, welcome stranger, I’m a hacker, and today I will like to share with you some of the tools I use to accomplish my craft.

Hacking is 60% skill and 40% tools. Without the right tools, you may be missing valuable information on your target. Most newcomers put their faith in BurpSuite, but as only a few of us know, this awesome software doesn’t have it all, which is why you will need some extra tools to find the best bugs out there and get paid for it.

TheTools:

These are some of the tools I use daily. Tools which are useful for vulnerability hunting, in no particular order.

-Secapps or AppBandit

AppBandit is an interception attack proxy so any traffic that goes through its built-in proxy server can be impersonated. But unlike other proxies, this is not a requirement, neither it is the only thing it does. AppBandit can consume data feeds from remote endpoints including processing PCAP data captured by libpcap and equivalent libraries. We will use “Pown Now” from pown.js to capture the data. The endpoint is setup locally for convenience but you can put it anywhere, including your Pi Zero W.

-Knockpy

Knockpy is a python3 tool designed to quickly enumerate subdomains on a target domain through dictionary attack.

-Sublist3r

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by c0d3x27

OSCP || OSWE || CompTIA CYSA+, Sec+, A+, ITF+, CSAP | | 0-day Researcher | | Security Consultant

Write a response

Vooki scanner can also be considered in the list.

--