AI-generated summary
The document lists various cybersecurity tools categorized into different types:
1. **Information Gathering Tools**: Nmap, Dracnmap, RED HAWK, ReconSpider, SecretFinder, Ranger Reloaded, Breacher.
2. **Wordlist Generators**: SMWYG, Goblin Word Generator, WLCreator, CUPP.
3. **WiFi Attack Tools**: FastSSH, Wifipumpkin3, PixieWPS, BluePot, Fluxion, Wifite2, FakeAP.
4. **SQL Injection Tools**: SQLMap, NoSQLMap, DSSS, Explo, Blisqy, Leviathan, SQLScan.
5. **Phishing Tools**: I See You, OhMyQR, BlackPhish, Evilginx2, SayCheese.
6. **Web Attack Tools**: Web2Attack, Dirb, Takeover, Blazy, CheckURL, Sublist3r.
7. **Post-Exploitation Tools**: Vegile, Hera Keylogger.
8. **Forensic Tools**: Guymager, Bulk Extractor, Toolsley.
9. **Exploitation Frameworks**: RouterSploit, Web2Attack, Commix, WebSploit.
10. **Remote Management Tools**: Stitch, PyShell.
11. **XSS Attack Tools**: Dalfox, XSS-LOADER, Extended XSS Search, XSStrike.
12. **Email Verification Tools**: KnockMail.
13. **Media Finders**: Social Mapper, FindUser (open-source/needs modifications).