10 open source tools that feel illegal...
TL;DR
This video introduces 10 open-source penetration testing tools available on Kali Linux, demonstrating how to map networks, capture traffic, exploit vulnerabilities, crack passwords, and perform forensic recovery for ethical hacking and security auditing.
🌐 Network Reconnaissance & Traffic Analysis 3 insights
Nmap discovers open ports and OS types
This tool maps networks by sending packets across IP ranges to identify hosts, open ports, and operating systems for vulnerability assessment.
Wireshark captures microscopic network traffic
It analyzes hundreds of protocols in real-time to inspect packet payloads and detect unauthorized data exfiltration or suspicious connections.
Aircrack-ng tests WiFi encryption strength
It monitors wireless networks, captures packets, and cracks WPA keys to audit the security of wireless access points.
🛠️ Exploitation & Web Attack Frameworks 4 insights
Metasploit simplifies complex penetration testing
This framework allows launching sophisticated attacks like reverse shells using pre-built exploits for known vulnerabilities such as EternalBlue.
SQLMap automates database reconnaissance tasks
It scans websites to map database schemas and execute SQL injection attacks by submitting malicious SQL statements through web forms.
Skipfish identifies web application vulnerabilities
The tool recursively crawls websites to detect XSS, SQL injection flaws, and generates comprehensive HTML security reports.
Hping3 executes denial-of-service attacks
Using the flood option, it sends packets rapidly to overwhelm servers, potentially grinding services to a halt or incurring massive cloud costs.
🔓 Forensics & Credential Recovery 3 insights
Hashcat cracks password hashes efficiently
It employs brute-force or dictionary attacks using wordlists like RockYou to reverse-engineer hashed passwords, though strong algorithms like BCrypt resist cracking.
Foremost recovers deleted forensic data
This file carving tool scans disk images byte-by-byte to reconstruct deleted files by identifying headers and footers without requiring intact filesystems.
Social Engineering Toolkit creates phishing campaigns
It clones legitimate websites and deploys attacks via email, SMS, or QR codes to harvest credentials without writing custom code.
Bottom Line
Only use these tools on systems you own or have explicit written permission to test, as unauthorized access constitutes serious federal crimes carrying prison sentences.
More from Fireship
View all
The wild rise of OpenClaw...
OpenClaw is a viral open-source AI automation tool that gained 65,000 GitHub stars overnight, offering 24/7 autonomous task management through messaging apps like Telegram while running entirely on self-hosted hardware such as Raspberry Pis or Mac Minis.
Bun in 100 Seconds
Bun is an all-in-one JavaScript runtime built with Zig and JavaScriptCore that consolidates package management, bundling, testing, and transpiling into a single high-performance binary while maintaining full compatibility with the Node.js ecosystem.
More in Programming
View all
Tanstack Start Course Course
TanStack Start is a full-stack React framework powered by TanStack Router that provides SSR and server functions as a lightweight alternative to Next.js. Its isomorphic execution model runs code on both server and client, requiring specific patterns to handle server-only operations safely.
Open Models Coding Essentials – Running LLMs Locally and in the Cloud Course
Andrew Brown tests open-source coding models including Gemma 4, Kimi 2.5, and Qwen across local and cloud deployments to evaluate viable alternatives to proprietary solutions, finding that while some models perform surprisingly well, hardware constraints make cloud hosting the practical choice for most developers.