Network

Tools for network exploitation

18 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

BetterCAP 

Open-source      

Modular, portable man-in-the-middle framework

CrackMapExec 

Open-source        

Suite of tools for network penetration

dnschef 

Open-source      

Highly configurable DNS proxy

dnsenum 

Open-source    

Perl script with DNS enumeration, zone transfer, dictionary attack, and reverse lookup functionality

Dripcap 

Open-source      

Caffeinated packet analyzer for multiple OS

dsniff 

Open-source      

Recon & infiltration tools for networks

Ettercap 

Open-source      

Comprehensive suite for man-in-the-middle attacks

evilgrade 

Open-source      

Fake update injection

impacket 

Open-source      

Network protocol toolset focused on low-impact access

Intercepter-NG 

Open-source      

Multifunctional network toolkit for recon & interception

Morpheus 

Open-source      

Automated ettercap TCP/IP hijacking tool

pig 

Open-source    

Linux packet crafting tool with a library of attack signatures

pwnat 

Open-source    

Punches holes in firewalls/NATs without port or DMZ setup required

Scap-workbench 

Open-source    

A GUI tool with SCAP Scanner and tailoring functionality

scapy 

Open-source      

Python-based interactive packet manipulation program & library

tcpdump/libpcap 

Open-source    

Command-line packet analyzer tool

Wireshark 

Open-source    

A graphic interface surrounding tcpdump / network protocol analyzer

Yersina 

Open-source    

A network tool for 2-layer attacks