HackerHub

HackerHub

Learn cybersecurity, explore tools, get career-ready.

Ad placeholder

Featured Articles

Getting Started in Cybersecurity

Roadmap, learning paths, and practice platforms.

Web Pentesting Basics

Recon, common vulns, and tooling.

Linux Privilege Escalation

Enumeration and escalation techniques.

Explore Tools

Nmap

Nmap is a network scanning tool used to discover hosts and services across networks.

Recon
Website

Burp Suite

Burp Suite is a web proxy and security testing platform for web application assessments.

Web
Website

Metasploit

Metasploit Framework helps develop, test, and execute exploits and payloads against targets.

Exploit
Website

Wireshark

Wireshark is the world’s foremost and widely-used network protocol analyzer.

Analysis
Website

John the Ripper

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS.

Cracking
Website

Aircrack-ng

Complete suite of tools to assess WiFi network security.

Wireless
Website

Ghidra

A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate.

Reverse Engineering
Website

sqlmap

Automatic SQL injection and database takeover tool.

Web
Website

Hydra

A very fast network logon cracker which supports many different services.

Cracking
Website

OWASP ZAP

The world’s most widely used web app scanner. Free and open source.

Web
Website

Nessus

Widely used vulnerability scanner.

Scanner
Website

Hashcat

World's fastest password recovery tool.

Cracking
Website

Gobuster

Directory/File, DNS and VHost busting tool written in Go.

Recon
Website

Nikto

Web server scanner which performs comprehensive tests against web servers.

Web
Website

ffuf

Fast web fuzzer written in Go.

Web
Website

Dirb

Web content scanner.

Web
Website

Netcat

The Swiss army knife of networking.

Networking
Website

Socat

Multipurpose relay (SOcket CAT).

Networking
Website

Searchsploit

Command line search tool for Exploit-DB.

Exploit
Website

Mimikatz

A tool to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory.

Post-Exploitation
Website

Responder

LLMNR, NBT-NS and MDNS poisoner.

Post-Exploitation
Website

BloodHound

Active Directory trust relationship visualization.

Post-Exploitation
Website

CrackMapExec

Swiss army knife for pentesting networks.

Post-Exploitation
Website

Impacket

Collection of Python classes for working with network protocols.

Networking
Website

Commix

Automated all-in-one OS command injection and exploitation tool.

Web
Website

WPScan

WordPress vulnerability scanner.

Web
Website

Amass

In-depth attack surface mapping and asset discovery.

Recon
Website

Sublist3r

Fast subdomains enumeration tool.

Recon
Website

Maltego

Graphical link analysis tool for OSINT.

Recon
Website

Shodan

Search engine for Internet-connected devices.

Recon
Website

CyberChef

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.

Analysis
Website