Aircrack-ng
Is an 802.11 WEP, 802.11i WPA/WPA2, and 802.11w WPA2 key cracking program.
ARP-scan
Send ARP requests to target hosts and display responses.
atftp
Can be used interactively or in batch mode to retrieve files from TFTP servers.
AutoSSH
Autossh is a program to start a copy of ssh and monitor it, restarting it as necessary should it die or stop passing traffic.
Bettercap
The Swiss Army knife for WiFi, Bluetooth Low Energy, wireless HID hijacking and Ethernet networks reconnaissance and MITM attacks.
Brctl
Ethernet bridge administration.
Bruteshark
Is a Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files).
BTNAP
Bluetooth Network Access Point for Raspberry Pi.
CDPsnarf
A network sniffer exclusively written to extract information from CDP packets.
Certbot
Certbot can obtain and install HTTPS/TLS/SSL certificates thru LetsEncrypt.
Chisel
Chisel is a fast TCP tunnel, transported over HTTP, secured via SSH. 'Call home' solution.
cidr2ip
This program converts IPv4 CIDR blocks into their constituent IP addresses.
Create_ap
This script creates a NATed or Bridged WiFi Access Point.
ddosify
High-performance load testing tool, written in Golang.
DNSdiag
DNS Measurement, Troubleshooting and Security Auditing Toolset.
go-out
A simple, Golang egress buster.
iftop
Display bandwidth usage on an interface by host.
iPerf3
The ultimate speed test tool for TCP, UDP and SCTP.
iptables
Administration tool for IPv4 packet filtering and NAT.
MASSCAN
MASSCAN is a fast port scanner. The primary input parameters are the IP addresses/ranges you want to scan, and the port numbers..
NBTscan
NBTscan is a program for scanning IP networks for NetBIOS name information.
Netdiscover
Active/passive ARP reconnaissance tool.
NetworkMiner
NetworkMiner is an open source Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD)..
nginx
HTTP and reverse proxy server, mail proxy server.
nmap
Network exploration tool and security / port scanner.
OpenSSL
OpenSSL.
OpenVPN
Provides flexible VPN solutions for businesses to secure all data communications and extend private network services while maintaining security.
pfSense
World's Most Trusted Open Source Firewall.
Prips
Print IP addresses in a range.
Proxychains
ProxyChains is a UNIX program, that hooks network-related libc functions in dynamically linked programs via a preloaded DLL and redirects the connections through SOCKS4a/5 or HTTP proxies.
Responder
LLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay.
rsync
A fast, versatile, remote (and local) file-copying tool.
RustScan
Fast Port Scanner built in Rust. RustScans only job is to reduce the friction between finding open ports and inputting them into nmap.
Samba
Server to provide AD and SMB/CIFS services to clients.
Smap
A drop-in replacement for Nmap powered by shodan.io
socat
Multipurpose relay (SOcket CAT).
speedtest-cli
Command line interface for testing internet bandwidth using speedtest.net.
ssh
ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine.
sshuttle
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
Subnet Calculator
Subnet calculator written in Python. It takes IP address and subnet mask as an input and returns for a given subnet network and broadcast address, first and last IP host, wildcard mask and number of usable hosts.
Swaks
Swiss Army Knife for SMTP.
tcpdump
Is the world’s premier network analysis tool—combining both power and simplicity into a single command-line interface.
TShark
Dump and analyze network traffic on CLI.
UFW
This program is for managing a Linux firewall and aims to provide an easy to use interface for the user.
vlan-hop
Commands needed to do a VLAN hop.
vnstat
A console-based network traffic monitor.
Wavemon
A wireless network monitor.
Wireshark
Is the world's foremost and widely-used network protocol analyzer.
Yersinia
Is a framework for performing layer 2 attacks. It is designed to take advantage of some weaknesses in different network protocols.