TL;DR
Professional penetration tests rely on a structured arsenal of specialized tools - from reconnaissance tools like Naabu and Gobuster to vulnerability scanners like SSLScan and XSStrike to exploitation frameworks like Metasploit. Free open-source tools cover most phases of a pentest but never replace the experience and judgment of the pentester. Specialized tools like Typo3Scan or the iOS pentest suite show that targeted tools for specific platforms provide significant time advantages. This article compiles over 30 pentest tools with use cases, installation, and example commands.
Table of Contents (10 sections)
Penetration testers don’t need a single all-purpose tool—they need the right tool for the right phase. A port scanner is of little use if a target hasn’t been defined yet. An exploit framework is out of place before the attack surface has been fully mapped. The difference between a good and an excellent pentest often lies in using the right tool for the situation.
As a company specializing in penetration testing, we at AWARE7 GmbH have developed a toolset over the years that automates typical processes without losing sight of what matters most. No two penetration tests are alike, which is why you always need an expert who knows what to look for—and which tool will best help them do so.
This article compiles the most important penetration testing tools, organized by phase of deployment: from initial reconnaissance through scanning and enumeration to exploitation and specialized platform testing.
> Important Note: All tools presented here may only be used on systems for which explicit authorization has been granted. Unauthorized penetration tests are punishable by law.
How Penetration Testing Tools Work
Penetration tests follow a structured pattern. Penetration testing tools support the four key phases:
Scanning: Identification of known vulnerabilities and attack surfaces—largely automated by specialized tools.
Enumeration: Vulnerabilities are listed and logged so that the analyst can investigate individual findings in depth.
Prioritization: The pentester uses their experience to assess which vulnerabilities pose the greatest risk.
Evaluation: The results are interpreted and presented in a way that allows the client to understand them and translate them into concrete actions.
Tools primarily automate the first two phases. Prioritization and evaluation require human judgment—which is precisely why fully automated penetration testing solutions regularly fail.
Comparison Table: Penetration Testing Tools at a Glance
| Tool | Category | Use Case | Open Source? |
|---|---|---|---|
| Naabu | Reconnaissance | Port scanning | Yes |
| Gobuster | Enumeration | Directory & DNS brute force | Yes |
| Dirbuster | Enumeration | Directory brute force (GUI) | Yes |
| Dirsearch | Enumeration | Directory brute force (CLI) | Yes |
| SSLScan | Scanning | SSL/TLS encryption analysis | Yes |
| Arjun | Enumeration | HTTP parameter discovery | Yes |
| XSStrike | Vulnerability Testing | XSS detection + WAF fingerprinting | Yes |
| Typo3Scan | Specialized | TYPO3 misconfiguration scanner | Yes |
| Nmap | Reconnaissance | Network port scanning + service discovery | Yes |
| Metasploit | Exploitation Framework | Exploit development + vulnerability testing | Yes (Community) |
| Nikto | Scanning | Web server vulnerability scanner | Yes |
| SQLMap | Exploitation | SQL injection testing | Yes |
| Wireshark | Analysis | Network packet analysis | Yes |
| Burp Suite | Web Testing | Web proxy + vulnerability scanner | Yes (Community) |
| Amass / Fierce | Reconnaissance | Subdomain enumeration | Yes |
| Aircrack-ng | WLAN | WiFi security analysis | Yes |
| Acunetix | Scanning | Web Application Scanner (commercial) | No |
| Nessus | Scanning | Vulnerability Assessment | Yes (Free, limited) |
| Core Impact | Exploitation | Commercial Exploit Framework | No |
| Frida | iOS/Mobile | Runtime Instrumentation | Yes |
| Objection | iOS/Mobile | iOS runtime analysis without jailbreak | Yes |
| iRET | iOS/Mobile | iOS reverse engineering toolkit | Yes |
| DVIA | iOS/Mobile | Training app for iOS penetration tests | Yes |
1. Reconnaissance Tools
The reconnaissance phase is about gathering as much information as possible about the target system: open ports, running services, subdomains, version numbers. All information found in this phase is relevant—there is no such thing as unimportant data.
Naabu - Port Scanner in Go
Naabu is a fast port scanner written in the Go programming language. Go is characterized by high speed, which is a significant advantage for scanners: The scan completes much faster than with scanners written in older languages.
Use Case: Detect open ports on a target system, identify running services.
Particularly relevant are: Port 3389 (Remote Desktop Protocol—waits for remote control by external computers), Port 21 (FTP), Port 22 (SSH), as well as open IoT devices or webcams that are accessible via the Internet.
Installation:
git clone https://github.com/projectdiscovery/naabu.git
cd naabu/v2/cmd/naabu
go build
mv naabu /usr/local/bin/
Example:
naabu -host example.de
The default settings scan the top 100 ports. The output lists all open ports along with the detected service.
Nmap - Network Mapping
Nmap is one of the oldest penetration testing tools and receives regular updates. It is used to map a network, identify endpoints, and detect services. Thanks to TCP and UDP scanning mechanisms as well as various detection systems, Nmap is a fundamental requirement for nearly every penetration test. A GUI version (Zenmap) makes it easier to get started.
Applications: Network analysis, service and version detection, operating system fingerprinting.
Subdomain Enumerators: Amass & Fierce
For any attacker, discovering subdomains is an essential step. Forgotten subdomains often hide old systems that are easy to attack. Two widely used tools for this task are Fierce (included in Kali Linux) and Amass (an OWASP project, available via GitHub).
Use case: Subdomain enumeration, expanding the attack surface.
Google Hacking / OSINT
Google is not a traditional penetration testing tool, but its powerful search function makes it an important ally in information gathering. Using search operators such as site:, intitle:, filetype:, and others, you can find CVEs, exposed files, and sensitive configurations that are publicly indexed.
Application: Passive reconnaissance, OSINT.
2. Scanning & Enumeration
The initial reconnaissance is followed by targeted scanning: Which directories exist on the web server? What encryption methods does the server accept? Which HTTP parameters does a web application process?
Gobuster - Directory and DNS Brute Force in Go
Gobuster is written in Go and is therefore significantly faster than comparable tools in older languages. It finds unlinked folders and files on web servers using wordlist brute force—and can also discover subdomains via DNS brute force.
Use Cases: Hidden subpages, forgotten files on web servers, subdomain enumeration.
Pre-installed in Kali Linux: Yes.
Example:
gobuster dir -u https://beispiel.de -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt
Gobuster vs. Dirbuster: Dirbuster offers a graphical interface and enables recursive searches (i.e., automatically exploring found subdirectories). Gobuster, on the other hand, is significantly faster and additionally supports DNS brute-force mode. For large web servers, Gobuster is the better choice due to its speed advantage.
Dirbuster - Directory Brute Force with GUI
Dirbuster is the older counterpart to Gobuster and offers a graphical interface through which all settings can be clearly configured. A key advantage: the recursive search, which allows Dirbuster to discover deeply nested subdirectories with a single command.
Application: Hidden subpages, forgotten directories on web servers.
Dirsearch - CLI directory scanner
Dirsearch is a command-line tool that scans directories and files on servers using the brute-force method. It performs a blind search for accessible areas and thus automatically identifies vulnerabilities.
Use case: Directory and file search on servers, ideal as a companion to larger penetration tests.
SSLScan - SSL/TLS Encryption Analysis
SSLScan checks web servers for the SSL/TLS encryption methods they use. It negotiates multiple times with the target server and reports which cipher suites are accepted. Outdated or insecure encryption methods are highlighted in color.
Background: TLS ensures that sensitive activities such as online banking can be conducted securely over the Internet. SSLScan quickly determines whether a server still accepts older and insecure algorithms—useful, for example, for system administrators who want to identify which servers need to be updated.
Pre-installed in Kali Linux: Yes.
Example:
sslscan https://beispiel.de
History: The first version was released by Ian Ventura-Whiting on the Titania website. Version 2.0 added TLS 1.2 and TLS 1.3 without OS binding. The project is open source and available on GitHub.
Arjun - HTTP Parameter Discovery
Arjun finds hidden HTTP parameters in web applications. Web applications use HTTP parameters to store and manage user input—many of which are undocumented but may contain vulnerabilities.
Unlike many other tools, Arjun does not require an external wordlist: the parameter lists are included directly in the repository.
Use Case: Useful as a follow-up step after directory scanning with Gobuster or Dirbuster—when hidden paths are already known and their parameters need to be examined.
Not pre-installed in Kali Linux.
Installation:
git clone https://github.com/s0md3v/Arjun
cd Arjun
Example:
python3 arjun.py -u https://beispiel.de/suche
The tool identifies all valid parameters at the specified URL. These parameters can be analyzed for vulnerabilities during a penetration test.
3. Exploitation & Vulnerability Testing
Once attack vectors and parameters are known, the actual vulnerability analysis begins. Tools in this category check whether the identified input points can actually be exploited.
XSStrike - XSS Scanner with WAF Fingerprinting
XSStrike is a multifunctional scanner for detecting cross-site scripting (XSS) vulnerabilities. In addition to basic scanning, it can also examine web application firewalls (WAFs), create fingerprints, and perform fuzzing.
Background: XSS is one of the most common vulnerabilities on the internet. It occurs particularly where user input is processed—in search fields or contact forms. Injected malicious code is executed by other users within the website’s trusted context. There are three types of XSS: reflected, persistent, and DOM-based.
Not pre-installed in Kali Linux.
Installation:
git clone https://github.com/s0md3v/XSStrike
cd XSStrike
pip3 install -r requirements.txt
Example:
python3 xsstrike.py -u "https://beispiel.de/suche?" --params --skip-dom
The --params parameter enables automatic parameter detection, while --skip-dom skips DOM-XSS tests.
SQLMap - SQL Injection Testing
SQLMap automates the search for SQL injection vulnerabilities. It features a powerful engine and supports various injection types: time-based, boolean, error-based, and stacked. SQL injections occur when developers implement inadequate input validation.
Use case: Testing for SQL injection vulnerabilities in web applications and databases.
Metasploit - Exploitation Framework
Metasploit is more than a single tool—it is a comprehensive framework covering various areas: finding, validating, and exploiting vulnerabilities. It is used for web applications, networks, servers, and other IT systems. Security experts and attackers use it alike.
Metasploit includes well over 1,500 exploits and 500 payloads. It can write malicious code that bypasses detection systems, perform vulnerability scans, and launch remote attacks. There are three versions: Framework (open source), Community, and Professional (paid).
Use Cases: Validating and exploiting vulnerabilities, exploit development, post-exploitation.
Nikto - Web Server Scanner
Nikto is a free, open-source penetration testing tool for web server scans. It performs multi-stage tests and identifies more than 6,000 potentially dangerous files. It also checks servers for outdated versions and version-specific issues, as well as cross-site scripting. Nikto comes pre-installed in Kali Linux and many other hacking distributions.
Use Cases: Web server vulnerabilities, outdated software, misconfigurations.
Burp Suite - Web Proxy and Vulnerability Scanner
PortSwigger’s Burp Suite is a comprehensive tool for manual web penetration testing. It intercepts network traffic and enables targeted analysis of individual HTTP requests. There is a free Community Edition as well as a paid Pro version with extended functionality.
Use Cases: Web application testing, analysis of HTTP requests, automated vulnerability scanning.
BeEF - Browser Exploitation Framework
BeEF (Browser Exploitation Framework) is primarily suited for penetration tests targeting the browser. When vulnerabilities in the browser need to be identified, BeEF is a free and targeted tool.
Application: Browser vulnerabilities, client-side attack vectors.
4. Specialized Tools
Some target systems require specialized tools that are precisely tailored to the specific characteristics of the respective platform.
Typo3Scan - TYPO3 Misconfiguration Scanner
TYPO3 is a widely used open-source CMS that is often directly connected to a database. Misconfigurations in such systems represent a significant attack surface. Typo3Scan uses targeted queries to check how TYPO3 is configured on the web server and compares the results against a list of known vulnerabilities.
Use case: Detect misconfigurations in TYPO3 installations.
Not pre-installed in Kali Linux.
Installation:
git clone https://github.com/whoot/Typo3Scan.git
cd Typo3Scan
pip install -r requirements.txt
Note: Python 3.7 is recommended. You can check the version with python --version.
Example:
python3 typo3scan.py -d example.de --vuln
Aircrack-ng - WiFi Security Analysis
Aircrack-ng is a tool for checking the security of WiFi networks. It offers packet capture for monitoring, performs replay attacks and deauthentication, and can analyze common WiFi networks.
Application: WiFi security analysis, wireless networks.
Wireshark - Network Packet Analysis
Wireshark is a network protocol analyzer that captures data packets in real time and displays them in a readable format. In addition to Wi-Fi standards, it also supports Bluetooth, USB, and FDDI. For penetration testers, Wireshark is often a must-have for understanding what is actually happening on a network.
Historical note: Wireshark was formerly known as Ethereal.
Applications: Network monitoring, protocol analysis, identifying security issues.
5. iOS Penetration Testing Tools
iOS is considered a particularly secure mobile operating system—apps run in a sandbox without root access, have only limited read access, and must obtain user permission for any further access. Nevertheless, vulnerabilities exist, and iOS penetration testing is relevant for companies that deploy iPhones company-wide or process sensitive data on them.
For iOS penetration tests, it is important to be familiar with the three main directories:
/var/Application– Files from pre-installed applications/var/containers/Bundle/Application– Files from applications installed from the Apple App Store/var/mobile/Containers/data/Application- data stored by the app developer (also known as “Local Data Storage Container”)
Frida
Frida is a toolkit for developers, reverse engineers, and security researchers. It runs on Windows, macOS, Linux, iOS, watchOS, tvOS, and other systems. It allows scripts to be injected into running processes.
Use Cases: Dynamic analysis, reverse engineering, iOS penetration testing.
Objection
Objection is based on Frida and provides a runtime toolkit that helps assess security on iOS quickly and easily without jailbreaking.
Use Cases: iOS runtime analysis, security assessment without jailbreaking.
iRET - iOS Reverse Engineering Toolkit
iRET is a comprehensive toolkit that allows penetration testers to perform all tasks required for an iOS penetration test. It is used for the analysis and reverse engineering of iOS applications.
Use case: iOS application analysis, reverse engineering.
Burp Suite (iOS)
Burp Suite intercepts and analyzes network traffic from iOS devices. It has thus established itself as an important tool in the field of iOS penetration testing. The Community Edition is available for free.
Applications: HTTP/HTTPS traffic analysis on iOS, web app testing.
DVIA - Damn Vulnerable iOS App
DVIA (Damn Vulnerable iOS App) is an iOS application that serves as a training platform for iOS penetration testing. It is freely available via GitHub and is useful for anyone looking to learn iOS penetration testing or learn about past security vulnerabilities.
Use case: Training environment, understanding iOS vulnerabilities.
iGoat
iGoat is an OWASP extension that allows developers to learn about common security issues. It is divided into various lessons, each of which explains a security-related problem. It is less of a full-fledged penetration testing tool and more of a learning application for developers and security experts.
Use case: Training, understanding iOS security.
libimobiledevice
libimobiledevice is a library that can communicate natively with iOS devices—independently of Apple’s own libraries and without jailbreaking.
Use case: Communication with iOS services, forensics.
iFunbox
iFunbox is a file manager for iPhones that allows access to the file system of connected devices. On jailbroken devices, it even allows access to the app sandbox.
Use case: File system access, data transfer, iOS forensics.
6. Hacking Frameworks and Penetration Testing Operating Systems
The Right Operating System as a Foundation
By choosing the right operating system, the pentester lays the foundation for their tools. The most important options:
Kali Linux is the best-known hacking distribution. It is based on Debian, developed by Offensive Security, and comes with a large number of pre-installed tools. Kali Linux offers good documentation and an active community—ideal for getting started.
Parrot Security OS is aimed at penetration testers who need a developer- and tester-friendly environment with anonymization capabilities.
Ubuntu Linux is a general-purpose operating system. With Ubuntu, only the tools you actually need are installed—this is time-consuming, but the installation remains lean.
Black Arch is a specialized Arch Linux derivative for security researchers and penetration testers. It is not very beginner-friendly: many tools need to be customized after installation. Those who do not feel comfortable using the command line should steer clear of this distribution.
Other relevant tools from the field
The following list summarizes additional tools used in the daily work of professional penetration testers:
Acunetix is a commercial vulnerability scanner for web applications. It detects more than 7,000 vulnerabilities (SQL injections, XSS, misconfigurations, weak passwords, unprotected databases) and features macro recording technology for multi-level or password-protected areas.
Nessus is a scanner for vulnerability assessment in penetration tests. The Pro and Expert versions offer extensive features; the free version allows scanning of a limited IP address range.
Core Impact has been around for over twenty years and, according to its own claims, has the largest number of available exploits. All exploits are commercial-grade and come directly from Core Impact.
John The Ripper is a fast password cracker that supports hundreds of hash and encryption types—from user passwords to database servers and hard drives. Open source, with an optional paid Pro version.
Commix is a portable tool for command injection attacks. It automatically detects vulnerabilities and has a modular design—users can add their own modules.
Ettercap describes itself as a suite for man-in-the-middle attacks: sniffing live connections, content filtering on the fly, and protocol dissection.
Sn1per is an ASM (Continuous Attack Surface Management) platform. It is open source but is also available in an extended paid version.
Hexway is a self-hosted pentest workspace platform (PTaaS – Pentesting-as-a-Service) that enables comprehensive penetration testing within your own working environment.
FAQ
What is the difference between free and paid penetration testing tools?
Free tools usually focus on a specific area or use case and are limited accordingly. Paid tools like Nessus or Acunetix provide entire penetration testing suites to cover as many areas as possible. Many free tools also offer optional Pro versions with an expanded feature set.
Which tools are pre-installed in Kali Linux?
Kali Linux includes Gobuster, SSLScan, Nmap, Nikto, SQLMap, Wireshark, and Metasploit, among others. Tools such as Arjun, Naabu, XSStrike, and Typo3Scan must be installed separately.
Do penetration testing tools replace the penetration tester?
No. Tools primarily automate the scanning and identification of known vulnerabilities. Evaluating, prioritizing, and interpreting the results require human judgment and experience. This is one of the main reasons why fully automated penetration testing solutions regularly fail.
For which phases of the penetration test are there tools?
For all four phases: scanning (Nmap, Naabu, SSLScan), enumeration (Gobuster, Dirsearch, Arjun), prioritization (Burp Suite, Nikto), and the exploitation phase (Metasploit, SQLMap, XSStrike). However, the prioritization and evaluation of the results always rests with the experienced pentester.
Can anyone use these tools?
All tools presented here may only be used on systems for which explicit written permission from the system owner has been obtained. Unauthorized penetration tests are punishable under Section 202a of the German Criminal Code (StGB) (data espionage).
How much does a professional penetration test cost?
That depends on the scope, the target platform (web application, network, mobile app, cloud), and the depth of the test. AWARE7 offers customized penetration tests—the team is happy to provide a specific quote.
Conclusion
Choosing the right penetration testing tools is not a matter of having the largest arsenal—but rather of using them appropriately for the situation. An experienced penetration tester selects the right tool for each phase of the test and can interpret the results correctly.
At AWARE7, we have developed a toolset over the years that automates typical processes without losing sight of what matters most. If you need support with your next penetration test, please contact us.
Next Step
Our certified security experts will advise you on the topics covered in this article — free and without obligation.
Free · 30 minutes · No obligation
