Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Pentest Tools: The Best Tools for Penetration Testers [2026]
Offensive Security

Pentest Tools: The Best Tools for Penetration Testers [2026]

From Reconnaissance to Exploitation—An Overview of the Most Important Penetration Testing Tools, Including Their Applications, Installation, and Sample Commands.

Vincent Heinen Vincent Heinen Abteilungsleiter Offensive Services
12 min read read
OSCP+ OSCP OSWP OSWA

TL;DR

Professional penetration tests rely on a structured arsenal of specialized tools - from reconnaissance tools like Naabu and Gobuster to vulnerability scanners like SSLScan and XSStrike to exploitation frameworks like Metasploit. Free open-source tools cover most phases of a pentest but never replace the experience and judgment of the pentester. Specialized tools like Typo3Scan or the iOS pentest suite show that targeted tools for specific platforms provide significant time advantages. This article compiles over 30 pentest tools with use cases, installation, and example commands.

Table of Contents (10 sections)

Penetration testers don’t need a single all-purpose tool—they need the right tool for the right phase. A port scanner is of little use if a target hasn’t been defined yet. An exploit framework is out of place before the attack surface has been fully mapped. The difference between a good and an excellent pentest often lies in using the right tool for the situation.

As a company specializing in penetration testing, we at AWARE7 GmbH have developed a toolset over the years that automates typical processes without losing sight of what matters most. No two penetration tests are alike, which is why you always need an expert who knows what to look for—and which tool will best help them do so.

This article compiles the most important penetration testing tools, organized by phase of deployment: from initial reconnaissance through scanning and enumeration to exploitation and specialized platform testing.

> Important Note: All tools presented here may only be used on systems for which explicit authorization has been granted. Unauthorized penetration tests are punishable by law.


How Penetration Testing Tools Work

Penetration tests follow a structured pattern. Penetration testing tools support the four key phases:

Scanning: Identification of known vulnerabilities and attack surfaces—largely automated by specialized tools.

Enumeration: Vulnerabilities are listed and logged so that the analyst can investigate individual findings in depth.

Prioritization: The pentester uses their experience to assess which vulnerabilities pose the greatest risk.

Evaluation: The results are interpreted and presented in a way that allows the client to understand them and translate them into concrete actions.

Tools primarily automate the first two phases. Prioritization and evaluation require human judgment—which is precisely why fully automated penetration testing solutions regularly fail.


Comparison Table: Penetration Testing Tools at a Glance

ToolCategoryUse CaseOpen Source?
NaabuReconnaissancePort scanningYes
GobusterEnumerationDirectory & DNS brute forceYes
DirbusterEnumerationDirectory brute force (GUI)Yes
DirsearchEnumerationDirectory brute force (CLI)Yes
SSLScanScanningSSL/TLS encryption analysisYes
ArjunEnumerationHTTP parameter discoveryYes
XSStrikeVulnerability TestingXSS detection + WAF fingerprintingYes
Typo3ScanSpecializedTYPO3 misconfiguration scannerYes
NmapReconnaissanceNetwork port scanning + service discoveryYes
MetasploitExploitation FrameworkExploit development + vulnerability testingYes (Community)
NiktoScanningWeb server vulnerability scannerYes
SQLMapExploitationSQL injection testingYes
WiresharkAnalysisNetwork packet analysisYes
Burp SuiteWeb TestingWeb proxy + vulnerability scannerYes (Community)
Amass / FierceReconnaissanceSubdomain enumerationYes
Aircrack-ngWLANWiFi security analysisYes
AcunetixScanningWeb Application Scanner (commercial)No
NessusScanningVulnerability AssessmentYes (Free, limited)
Core ImpactExploitationCommercial Exploit FrameworkNo
FridaiOS/MobileRuntime InstrumentationYes
ObjectioniOS/MobileiOS runtime analysis without jailbreakYes
iRETiOS/MobileiOS reverse engineering toolkitYes
DVIAiOS/MobileTraining app for iOS penetration testsYes

1. Reconnaissance Tools

The reconnaissance phase is about gathering as much information as possible about the target system: open ports, running services, subdomains, version numbers. All information found in this phase is relevant—there is no such thing as unimportant data.

Naabu - Port Scanner in Go

Naabu is a fast port scanner written in the Go programming language. Go is characterized by high speed, which is a significant advantage for scanners: The scan completes much faster than with scanners written in older languages.

Use Case: Detect open ports on a target system, identify running services.

Particularly relevant are: Port 3389 (Remote Desktop Protocol—waits for remote control by external computers), Port 21 (FTP), Port 22 (SSH), as well as open IoT devices or webcams that are accessible via the Internet.

Installation:

git clone https://github.com/projectdiscovery/naabu.git
cd naabu/v2/cmd/naabu
go build
mv naabu /usr/local/bin/

Example:

naabu -host example.de

The default settings scan the top 100 ports. The output lists all open ports along with the detected service.


Nmap - Network Mapping

Nmap is one of the oldest penetration testing tools and receives regular updates. It is used to map a network, identify endpoints, and detect services. Thanks to TCP and UDP scanning mechanisms as well as various detection systems, Nmap is a fundamental requirement for nearly every penetration test. A GUI version (Zenmap) makes it easier to get started.

Applications: Network analysis, service and version detection, operating system fingerprinting.


Subdomain Enumerators: Amass & Fierce

For any attacker, discovering subdomains is an essential step. Forgotten subdomains often hide old systems that are easy to attack. Two widely used tools for this task are Fierce (included in Kali Linux) and Amass (an OWASP project, available via GitHub).

Use case: Subdomain enumeration, expanding the attack surface.


Google Hacking / OSINT

Google is not a traditional penetration testing tool, but its powerful search function makes it an important ally in information gathering. Using search operators such as site:, intitle:, filetype:, and others, you can find CVEs, exposed files, and sensitive configurations that are publicly indexed.

Application: Passive reconnaissance, OSINT.


2. Scanning & Enumeration

The initial reconnaissance is followed by targeted scanning: Which directories exist on the web server? What encryption methods does the server accept? Which HTTP parameters does a web application process?

Gobuster - Directory and DNS Brute Force in Go

Gobuster is written in Go and is therefore significantly faster than comparable tools in older languages. It finds unlinked folders and files on web servers using wordlist brute force—and can also discover subdomains via DNS brute force.

Use Cases: Hidden subpages, forgotten files on web servers, subdomain enumeration.

Pre-installed in Kali Linux: Yes.

Example:

gobuster dir -u https://beispiel.de -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt

Gobuster vs. Dirbuster: Dirbuster offers a graphical interface and enables recursive searches (i.e., automatically exploring found subdirectories). Gobuster, on the other hand, is significantly faster and additionally supports DNS brute-force mode. For large web servers, Gobuster is the better choice due to its speed advantage.


Dirbuster - Directory Brute Force with GUI

Dirbuster is the older counterpart to Gobuster and offers a graphical interface through which all settings can be clearly configured. A key advantage: the recursive search, which allows Dirbuster to discover deeply nested subdirectories with a single command.

Application: Hidden subpages, forgotten directories on web servers.


Dirsearch - CLI directory scanner

Dirsearch is a command-line tool that scans directories and files on servers using the brute-force method. It performs a blind search for accessible areas and thus automatically identifies vulnerabilities.

Use case: Directory and file search on servers, ideal as a companion to larger penetration tests.


SSLScan - SSL/TLS Encryption Analysis

SSLScan checks web servers for the SSL/TLS encryption methods they use. It negotiates multiple times with the target server and reports which cipher suites are accepted. Outdated or insecure encryption methods are highlighted in color.

Background: TLS ensures that sensitive activities such as online banking can be conducted securely over the Internet. SSLScan quickly determines whether a server still accepts older and insecure algorithms—useful, for example, for system administrators who want to identify which servers need to be updated.

Pre-installed in Kali Linux: Yes.

Example:

sslscan https://beispiel.de

History: The first version was released by Ian Ventura-Whiting on the Titania website. Version 2.0 added TLS 1.2 and TLS 1.3 without OS binding. The project is open source and available on GitHub.


Arjun - HTTP Parameter Discovery

Arjun finds hidden HTTP parameters in web applications. Web applications use HTTP parameters to store and manage user input—many of which are undocumented but may contain vulnerabilities.

Unlike many other tools, Arjun does not require an external wordlist: the parameter lists are included directly in the repository.

Use Case: Useful as a follow-up step after directory scanning with Gobuster or Dirbuster—when hidden paths are already known and their parameters need to be examined.

Not pre-installed in Kali Linux.

Installation:

git clone https://github.com/s0md3v/Arjun
cd Arjun

Example:

python3 arjun.py -u https://beispiel.de/suche

The tool identifies all valid parameters at the specified URL. These parameters can be analyzed for vulnerabilities during a penetration test.


3. Exploitation & Vulnerability Testing

Once attack vectors and parameters are known, the actual vulnerability analysis begins. Tools in this category check whether the identified input points can actually be exploited.

XSStrike - XSS Scanner with WAF Fingerprinting

XSStrike is a multifunctional scanner for detecting cross-site scripting (XSS) vulnerabilities. In addition to basic scanning, it can also examine web application firewalls (WAFs), create fingerprints, and perform fuzzing.

Background: XSS is one of the most common vulnerabilities on the internet. It occurs particularly where user input is processed—in search fields or contact forms. Injected malicious code is executed by other users within the website’s trusted context. There are three types of XSS: reflected, persistent, and DOM-based.

Not pre-installed in Kali Linux.

Installation:

git clone https://github.com/s0md3v/XSStrike
cd XSStrike
pip3 install -r requirements.txt

Example:

python3 xsstrike.py -u "https://beispiel.de/suche?" --params --skip-dom

The --params parameter enables automatic parameter detection, while --skip-dom skips DOM-XSS tests.


SQLMap - SQL Injection Testing

SQLMap automates the search for SQL injection vulnerabilities. It features a powerful engine and supports various injection types: time-based, boolean, error-based, and stacked. SQL injections occur when developers implement inadequate input validation.

Use case: Testing for SQL injection vulnerabilities in web applications and databases.


Metasploit - Exploitation Framework

Metasploit is more than a single tool—it is a comprehensive framework covering various areas: finding, validating, and exploiting vulnerabilities. It is used for web applications, networks, servers, and other IT systems. Security experts and attackers use it alike.

Metasploit includes well over 1,500 exploits and 500 payloads. It can write malicious code that bypasses detection systems, perform vulnerability scans, and launch remote attacks. There are three versions: Framework (open source), Community, and Professional (paid).

Use Cases: Validating and exploiting vulnerabilities, exploit development, post-exploitation.


Nikto - Web Server Scanner

Nikto is a free, open-source penetration testing tool for web server scans. It performs multi-stage tests and identifies more than 6,000 potentially dangerous files. It also checks servers for outdated versions and version-specific issues, as well as cross-site scripting. Nikto comes pre-installed in Kali Linux and many other hacking distributions.

Use Cases: Web server vulnerabilities, outdated software, misconfigurations.


Burp Suite - Web Proxy and Vulnerability Scanner

PortSwigger’s Burp Suite is a comprehensive tool for manual web penetration testing. It intercepts network traffic and enables targeted analysis of individual HTTP requests. There is a free Community Edition as well as a paid Pro version with extended functionality.

Use Cases: Web application testing, analysis of HTTP requests, automated vulnerability scanning.


BeEF - Browser Exploitation Framework

BeEF (Browser Exploitation Framework) is primarily suited for penetration tests targeting the browser. When vulnerabilities in the browser need to be identified, BeEF is a free and targeted tool.

Application: Browser vulnerabilities, client-side attack vectors.


4. Specialized Tools

Some target systems require specialized tools that are precisely tailored to the specific characteristics of the respective platform.

Typo3Scan - TYPO3 Misconfiguration Scanner

TYPO3 is a widely used open-source CMS that is often directly connected to a database. Misconfigurations in such systems represent a significant attack surface. Typo3Scan uses targeted queries to check how TYPO3 is configured on the web server and compares the results against a list of known vulnerabilities.

Use case: Detect misconfigurations in TYPO3 installations.

Not pre-installed in Kali Linux.

Installation:

git clone https://github.com/whoot/Typo3Scan.git
cd Typo3Scan
pip install -r requirements.txt

Note: Python 3.7 is recommended. You can check the version with python --version.

Example:

python3 typo3scan.py -d example.de --vuln

Aircrack-ng - WiFi Security Analysis

Aircrack-ng is a tool for checking the security of WiFi networks. It offers packet capture for monitoring, performs replay attacks and deauthentication, and can analyze common WiFi networks.

Application: WiFi security analysis, wireless networks.


Wireshark - Network Packet Analysis

Wireshark is a network protocol analyzer that captures data packets in real time and displays them in a readable format. In addition to Wi-Fi standards, it also supports Bluetooth, USB, and FDDI. For penetration testers, Wireshark is often a must-have for understanding what is actually happening on a network.

Historical note: Wireshark was formerly known as Ethereal.

Applications: Network monitoring, protocol analysis, identifying security issues.


5. iOS Penetration Testing Tools

iOS is considered a particularly secure mobile operating system—apps run in a sandbox without root access, have only limited read access, and must obtain user permission for any further access. Nevertheless, vulnerabilities exist, and iOS penetration testing is relevant for companies that deploy iPhones company-wide or process sensitive data on them.

For iOS penetration tests, it is important to be familiar with the three main directories:

  • /var/Application – Files from pre-installed applications
  • /var/containers/Bundle/Application – Files from applications installed from the Apple App Store
  • /var/mobile/Containers/data/Application - data stored by the app developer (also known as “Local Data Storage Container”)

Frida

Frida is a toolkit for developers, reverse engineers, and security researchers. It runs on Windows, macOS, Linux, iOS, watchOS, tvOS, and other systems. It allows scripts to be injected into running processes.

Use Cases: Dynamic analysis, reverse engineering, iOS penetration testing.


Objection

Objection is based on Frida and provides a runtime toolkit that helps assess security on iOS quickly and easily without jailbreaking.

Use Cases: iOS runtime analysis, security assessment without jailbreaking.


iRET - iOS Reverse Engineering Toolkit

iRET is a comprehensive toolkit that allows penetration testers to perform all tasks required for an iOS penetration test. It is used for the analysis and reverse engineering of iOS applications.

Use case: iOS application analysis, reverse engineering.


Burp Suite (iOS)

Burp Suite intercepts and analyzes network traffic from iOS devices. It has thus established itself as an important tool in the field of iOS penetration testing. The Community Edition is available for free.

Applications: HTTP/HTTPS traffic analysis on iOS, web app testing.


DVIA - Damn Vulnerable iOS App

DVIA (Damn Vulnerable iOS App) is an iOS application that serves as a training platform for iOS penetration testing. It is freely available via GitHub and is useful for anyone looking to learn iOS penetration testing or learn about past security vulnerabilities.

Use case: Training environment, understanding iOS vulnerabilities.


iGoat

iGoat is an OWASP extension that allows developers to learn about common security issues. It is divided into various lessons, each of which explains a security-related problem. It is less of a full-fledged penetration testing tool and more of a learning application for developers and security experts.

Use case: Training, understanding iOS security.


libimobiledevice

libimobiledevice is a library that can communicate natively with iOS devices—independently of Apple’s own libraries and without jailbreaking.

Use case: Communication with iOS services, forensics.


iFunbox

iFunbox is a file manager for iPhones that allows access to the file system of connected devices. On jailbroken devices, it even allows access to the app sandbox.

Use case: File system access, data transfer, iOS forensics.


6. Hacking Frameworks and Penetration Testing Operating Systems

The Right Operating System as a Foundation

By choosing the right operating system, the pentester lays the foundation for their tools. The most important options:

Kali Linux is the best-known hacking distribution. It is based on Debian, developed by Offensive Security, and comes with a large number of pre-installed tools. Kali Linux offers good documentation and an active community—ideal for getting started.

Parrot Security OS is aimed at penetration testers who need a developer- and tester-friendly environment with anonymization capabilities.

Ubuntu Linux is a general-purpose operating system. With Ubuntu, only the tools you actually need are installed—this is time-consuming, but the installation remains lean.

Black Arch is a specialized Arch Linux derivative for security researchers and penetration testers. It is not very beginner-friendly: many tools need to be customized after installation. Those who do not feel comfortable using the command line should steer clear of this distribution.


Other relevant tools from the field

The following list summarizes additional tools used in the daily work of professional penetration testers:

Acunetix is a commercial vulnerability scanner for web applications. It detects more than 7,000 vulnerabilities (SQL injections, XSS, misconfigurations, weak passwords, unprotected databases) and features macro recording technology for multi-level or password-protected areas.

Nessus is a scanner for vulnerability assessment in penetration tests. The Pro and Expert versions offer extensive features; the free version allows scanning of a limited IP address range.

Core Impact has been around for over twenty years and, according to its own claims, has the largest number of available exploits. All exploits are commercial-grade and come directly from Core Impact.

John The Ripper is a fast password cracker that supports hundreds of hash and encryption types—from user passwords to database servers and hard drives. Open source, with an optional paid Pro version.

Commix is a portable tool for command injection attacks. It automatically detects vulnerabilities and has a modular design—users can add their own modules.

Ettercap describes itself as a suite for man-in-the-middle attacks: sniffing live connections, content filtering on the fly, and protocol dissection.

Sn1per is an ASM (Continuous Attack Surface Management) platform. It is open source but is also available in an extended paid version.

Hexway is a self-hosted pentest workspace platform (PTaaS – Pentesting-as-a-Service) that enables comprehensive penetration testing within your own working environment.


FAQ

What is the difference between free and paid penetration testing tools?

Free tools usually focus on a specific area or use case and are limited accordingly. Paid tools like Nessus or Acunetix provide entire penetration testing suites to cover as many areas as possible. Many free tools also offer optional Pro versions with an expanded feature set.

Which tools are pre-installed in Kali Linux?

Kali Linux includes Gobuster, SSLScan, Nmap, Nikto, SQLMap, Wireshark, and Metasploit, among others. Tools such as Arjun, Naabu, XSStrike, and Typo3Scan must be installed separately.

Do penetration testing tools replace the penetration tester?

No. Tools primarily automate the scanning and identification of known vulnerabilities. Evaluating, prioritizing, and interpreting the results require human judgment and experience. This is one of the main reasons why fully automated penetration testing solutions regularly fail.

For which phases of the penetration test are there tools?

For all four phases: scanning (Nmap, Naabu, SSLScan), enumeration (Gobuster, Dirsearch, Arjun), prioritization (Burp Suite, Nikto), and the exploitation phase (Metasploit, SQLMap, XSStrike). However, the prioritization and evaluation of the results always rests with the experienced pentester.

Can anyone use these tools?

All tools presented here may only be used on systems for which explicit written permission from the system owner has been obtained. Unauthorized penetration tests are punishable under Section 202a of the German Criminal Code (StGB) (data espionage).

How much does a professional penetration test cost?

That depends on the scope, the target platform (web application, network, mobile app, cloud), and the depth of the test. AWARE7 offers customized penetration tests—the team is happy to provide a specific quote.


Conclusion

Choosing the right penetration testing tools is not a matter of having the largest arsenal—but rather of using them appropriately for the situation. An experienced penetration tester selects the right tool for each phase of the test and can interpret the results correctly.

At AWARE7, we have developed a toolset over the years that automates typical processes without losing sight of what matters most. If you need support with your next penetration test, please contact us.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Vincent Heinen
Vincent Heinen

Abteilungsleiter Offensive Services

E-Mail

M.Sc. IT-Sicherheit mit über 5 Jahren Erfahrung in offensiver Sicherheitsanalyse. Leitet die Durchführung von Penetrationstests mit Spezialisierung auf Web-Applikationen, Netzwerk-Infrastruktur, Reverse Engineering und Hardware-Sicherheit. Verantwortlich für mehrere Responsible Disclosures.

OSCP+ OSCP OSWP OSWA
Certified ISO 27001ISO 9001AZAVBSI

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung