Network discovery and security auditing tool used to discover hosts and services on a network
Network protocol analyzer used to capture and examine network traffic for troubleshooting and security analysis
Penetration testing framework used to test system vulnerabilities and develop security defenses
Web application security testing platform used to find vulnerabilities in web applications
Vulnerability scanner that identifies security weaknesses in systems and networks
Password cracking tool used to test password strength and security policies
Wireless network security testing suite for auditing WiFi network security
Advanced password recovery tool that uses GPU acceleration to crack password hashes
Automated tool for detecting and exploiting SQL injection vulnerabilities in databases
Network login cracker used to test authentication security across various protocols
Open-source web application security scanner used to find vulnerabilities during development
Web server scanner that tests for dangerous files and outdated server software
Directory and file brute-forcing tool used to discover hidden web content
The "Swiss Army knife" of networking because it can read/write data across network connections
High-speed port scanner capable of scanning the entire internet quickly
Web content scanner used to find hidden directories and files on web servers
Link analysis tool for gathering and visualizing information about people and organizations
Search engine for internet-connected devices used for security research and asset discovery
Web application security reconnaissance tool that creates interactive site maps
Browser exploitation framework used to test client-side security and browser vulnerabilities
Framework for testing human element security through social engineering simulations
Wireless network detector and intrusion detection system for 802.11 networks
Digital forensics platform used to analyze hard drives and mobile devices
Memory forensics framework used to analyze RAM dumps for incident response
Automated malware analysis system used to analyze suspicious files safely
Pattern matching engine used to identify and classify malware samples
Network intrusion detection system that monitors traffic for suspicious activity
Open-source firewall and routing platform used for network security
Anonymity tool used to protect privacy and bypass censorship for legitimate research
Tool that forces network connections through proxy servers for anonymity during testing
Remember: Use all available resources to study. Flearn alone cannot guarantee success in any exams—make sure to supplement your learning!