10 open source tools that feel illegal...

| Programming | February 05, 2026 | 1.09 Million views | 10:04

TL;DR

This video introduces 10 open-source penetration testing tools available on Kali Linux, demonstrating how to map networks, capture traffic, exploit vulnerabilities, crack passwords, and perform forensic recovery for ethical hacking and security auditing.

🌐 Network Reconnaissance & Traffic Analysis 3 insights

Nmap discovers open ports and OS types

This tool maps networks by sending packets across IP ranges to identify hosts, open ports, and operating systems for vulnerability assessment.

Wireshark captures microscopic network traffic

It analyzes hundreds of protocols in real-time to inspect packet payloads and detect unauthorized data exfiltration or suspicious connections.

Aircrack-ng tests WiFi encryption strength

It monitors wireless networks, captures packets, and cracks WPA keys to audit the security of wireless access points.

🛠️ Exploitation & Web Attack Frameworks 4 insights

Metasploit simplifies complex penetration testing

This framework allows launching sophisticated attacks like reverse shells using pre-built exploits for known vulnerabilities such as EternalBlue.

SQLMap automates database reconnaissance tasks

It scans websites to map database schemas and execute SQL injection attacks by submitting malicious SQL statements through web forms.

Skipfish identifies web application vulnerabilities

The tool recursively crawls websites to detect XSS, SQL injection flaws, and generates comprehensive HTML security reports.

Hping3 executes denial-of-service attacks

Using the flood option, it sends packets rapidly to overwhelm servers, potentially grinding services to a halt or incurring massive cloud costs.

🔓 Forensics & Credential Recovery 3 insights

Hashcat cracks password hashes efficiently

It employs brute-force or dictionary attacks using wordlists like RockYou to reverse-engineer hashed passwords, though strong algorithms like BCrypt resist cracking.

Foremost recovers deleted forensic data

This file carving tool scans disk images byte-by-byte to reconstruct deleted files by identifying headers and footers without requiring intact filesystems.

Social Engineering Toolkit creates phishing campaigns

It clones legitimate websites and deploys attacks via email, SMS, or QR codes to harvest credentials without writing custom code.

Bottom Line

Only use these tools on systems you own or have explicit written permission to test, as unauthorized access constitutes serious federal crimes carrying prison sentences.

More from Fireship

View all
The wild rise of OpenClaw...
5:19
Fireship Fireship

The wild rise of OpenClaw...

OpenClaw is a viral open-source AI automation tool that gained 65,000 GitHub stars overnight, offering 24/7 autonomous task management through messaging apps like Telegram while running entirely on self-hosted hardware such as Raspberry Pis or Mac Minis.

3 months ago · 9 points
Bun in 100 Seconds
2:46
Fireship Fireship

Bun in 100 Seconds

Bun is an all-in-one JavaScript runtime built with Zig and JavaScriptCore that consolidates package management, bundling, testing, and transpiling into a single high-performance binary while maintaining full compatibility with the Node.js ecosystem.

4 months ago · 7 points

More in Programming

View all
Tanstack Start Course Course
30:57
Traversy Media Traversy Media

Tanstack Start Course Course

TanStack Start is a full-stack React framework powered by TanStack Router that provides SSR and server functions as a lightweight alternative to Next.js. Its isomorphic execution model runs code on both server and client, requiring specific patterns to handle server-only operations safely.

2 days ago · 10 points
Open Models Coding Essentials – Running LLMs Locally and in the Cloud Course
2:17:28
freeCodeCamp.org freeCodeCamp.org

Open Models Coding Essentials – Running LLMs Locally and in the Cloud Course

Andrew Brown tests open-source coding models including Gemma 4, Kimi 2.5, and Qwen across local and cloud deployments to evaluate viable alternatives to proprietary solutions, finding that while some models perform surprisingly well, hardware constraints make cloud hosting the practical choice for most developers.

2 days ago · 10 points