Skip to main content

Installed Tools Reference


Pre-installed Security Tools Reference

All of the following tools are pre-installed in your environment and ready to use immediately. You can invoke them directly from the command line. If you need help with any tool's usage, flags, or advanced features, do online research to find the most up-to-date documentation.

If you need a tool that is not listed below, you are free to download and install it yourself using apt-get, pip, go install, git clone, or any other method. Your environment has full network access and root privileges.


USE THESE TOOLS — They Are Your Biggest Advantage

You should use these pre-installed tools as much as possible. They are purpose-built for security testing and will produce far better results than manual techniques or writing custom scripts. Do not reinvent the wheel — if a tool exists for the job, use it.

When to reach for which tool

SituationTools to useExample
Starting a new target — you need to understand what's runningnmap, pd-httpx, whatwebnmap -sV -sC -p- target.com to find all open ports and services, then pd-httpx -sc -title -tech-detect -l urls.txt to probe web services
Finding subdomains and expanding attack surfacesubfinder, amass, sublist3rsubfinder -d target.com -silent | pd-httpx -sc -title to enumerate subdomains and check which are live
Discovering hidden endpoints and directoriesferoxbuster, ffuf, gobuster, katanaferoxbuster -u https://target.com -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt to brute-force paths
Finding hidden API parametersarjun, ffufarjun -u https://target.com/api/endpoint to discover undocumented GET/POST parameters
Scanning for known vulnerabilitiesnuclei, niktonuclei -u https://target.com -as to auto-select relevant templates, nikto -h https://target.com for web server misconfigs
Testing for SQL injectionsqlmapsqlmap -u "https://target.com/page?id=1" --batch --risk=2 --level=3 to test and exploit SQLi
Testing JWT tokensjwt_tooljwt_tool <token> -M at to test all known JWT attack vectors (none alg, key confusion, etc.)
Checking SSL/TLS securitysslscan, testssl.shtestssl.sh https://target.com for comprehensive TLS assessment including weak ciphers and vulns
Detecting secrets in codegitleaks, trufflehoggitleaks detect --source /workspace/repo to find hardcoded API keys and credentials
Finding secrets in JavaScriptsecretfindersecretfinder -i https://target.com/app.js -o cli to extract API keys and tokens from JS bundles
Detecting WAF presencewafw00fwafw00f https://target.com to identify which WAF is protecting the target before choosing evasion techniques
Testing CORS misconfigurationscorscannercorscanner -u https://target.com to check for permissive CORS policies
Blind vulnerability detection (SSRF, XXE, RCE)interactsh-clientRun interactsh-client to generate an interaction URL, inject it into payloads, and watch for out-of-band callbacks (connects to our self-hosted server automatically)
Discovering historical endpoints, removed pages, old JS filesWayback Machine CDX API (via curl)curl -s "https://web.archive.org/cdx/search/cdx?url=target.com/*&output=json&fl=timestamp,original,statuscode,mimetype&collapse=urlkey&limit=10000" to find old admin panels, API endpoints, JS files with hardcoded secrets
Crawling JavaScript-heavy siteskatana, Playwright MCPkatana -u https://target.com -jc -d 3 to crawl and extract JS endpoints, or use Playwright for full browser rendering
Cloud resource enumerations3scanner, cloud_enum, prowlers3scanner -bucket-file buckets.txt to find open S3 buckets, prowler aws for full AWS security audit
Fuzzing web inputsffufffuf -w /usr/share/seclists/Fuzzing/special-chars.txt -u https://target.com/search?q=FUZZ -mc all -fc 404
API endpoint discoverykr (Kiterunner)kr scan https://target.com -w /opt/kiterunner/routes-large.kite to discover API routes using common patterns
Parsing JSON API responsesjqcurl -s https://target.com/api/data | jq '.results[] | {id, name, email}' to extract and filter fields

Key principles

  1. Always start with automated scanning before manual testing. Run nmap, nuclei, nikto, and subfinder early — they find low-hanging fruit while you plan deeper attacks.
  2. Use wordlists from SecLists (/usr/share/seclists/). They are comprehensive and battle-tested. Don't write your own.
  3. Chain tools together. Pipe output from one tool into another: subfinder -d target.com -silent | pd-httpx -sc | nuclei -as.
  4. Use ffuf for any fuzzing task — parameters, headers, paths, virtual hosts. It's the most versatile fuzzer available.
  5. Don't write Python scripts for tasks these tools already handle. sqlmap is better at SQLi than any custom script. nuclei knows more vulnerability signatures than you can write manually.
  6. Use jq to parse JSON responses instead of writing custom parsers.
  7. Run nuclei with auto-selection (-as) to automatically pick relevant templates based on the target's tech stack.

Reconnaissance & Discovery

ToolCommandDescription
NmapnmapNetwork scanner for port discovery, service detection, and OS fingerprinting
MasscanmasscanHigh-speed TCP port scanner for large-scale network sweeps
SubfindersubfinderPassive subdomain enumeration using multiple online sources
AmassamassIn-depth subdomain enumeration and network mapping with DNS, scraping, and APIs
Sublist3rsublist3rFast subdomain enumeration using search engines and public datasets
httpxpd-httpxHTTP toolkit for probing live hosts, grabbing titles, status codes, and tech fingerprints
KatanakatanaNext-generation web crawler for discovering endpoints and JavaScript-linked URLs
WhatWebwhatwebWeb technology fingerprinter identifying CMS, frameworks, server software, and plugins
WhoiswhoisDomain/IP registration lookup for ownership, registrar, and netblock info
digdigDNS lookup utility for querying A, AAAA, MX, TXT, CNAME, and other record types
Shodanpython3 -c "import shodan"Python library for querying the Shodan search engine (API key required)
Recon-ngrecon-ngFull-featured reconnaissance framework with modular plugins for OSINT gathering
SherlocksherlockHunt usernames across 300+ social networks and websites
ExifToolexiftoolRead, write, and edit metadata in images, documents, and multimedia files
HTTrackhttrackWebsite copier for mirroring sites locally for offline analysis
Wayback Machine CDX APIcurlQuery historical snapshots via web.archive.org/cdx/search/cdx to discover removed pages, old endpoints, leaked JS files, and deprecated subdomains. No auth required. Use collapse=urlkey to deduplicate, filter=statuscode:200 for successful responses, &limit=10000 for large domains. Respect rate limits (1 req/s)

Web Application Scanning

ToolCommandDescription
NiktoniktoWeb server scanner checking for dangerous files, outdated software, and misconfigurations
NucleinucleiTemplate-based vulnerability scanner with thousands of community-contributed checks
OWASP ZAPzap-cliHeadless web application security scanner for DAST (active/passive scanning, spidering)
WAFw00fwafw00fWeb Application Firewall detection and fingerprinting tool
CORScannercorscannerDetect CORS misconfigurations that could allow cross-origin data theft

Directory & Content Discovery

ToolCommandDescription
FeroxbusterferoxbusterFast, recursive content discovery tool written in Rust
GobustergobusterDirectory, DNS, S3, and vhost brute-forcing tool
ffufffufFast web fuzzer for directory discovery, parameter brute-forcing, and virtual host enumeration
Dirsearchpython3 -m dirsearchWeb path scanner with recursive brute-force capabilities
KiterunnerkrContext-aware API endpoint discovery using wordlists and OpenAPI schemas
ArjunarjunHTTP parameter discovery tool for finding hidden GET/POST parameters

Exploitation & Injection

ToolCommandDescription
SQLMapsqlmapAutomatic SQL injection detection and exploitation (supports all major DBMS)
NoSQLMappython3 /opt/NoSQLMap/nosqlmap.pyAutomated NoSQL injection testing for MongoDB and CouchDB
MetasploitmsfconsoleFull penetration testing framework with exploits, payloads, encoders, and post-exploitation modules
jwt_tooljwt_toolTest and exploit JSON Web Tokens (none algorithm, key confusion, claim tampering)

Authentication & Credential Testing

ToolCommandDescription
HashcathashcatAdvanced password recovery / hash cracking with GPU support
John the RipperjohnPassword cracker supporting hundreds of hash types and formats

Secret & Leak Detection

ToolCommandDescription
GitleaksgitleaksScan git repositories for hardcoded secrets, API keys, and credentials
TruffleHogtrufflehogFind leaked credentials in git repos, S3 buckets, and filesystems using entropy and regex
SecretFindersecretfinderDiscover sensitive data (API keys, tokens) in JavaScript files

SSL/TLS & Cryptography

ToolCommandDescription
SSLScansslscanTest SSL/TLS services for supported ciphers, protocols, and certificate details
testssl.shtestssl.shComprehensive TLS/SSL testing including BEAST, POODLE, Heartbleed, and cipher enumeration

Network & Protocol Tools

ToolCommandDescription
curlcurlTransfer data via HTTP, HTTPS, FTP, and many other protocols
wgetwgetDownload files and mirror websites over HTTP/HTTPS/FTP
NetcatncVersatile networking tool for reading/writing across TCP and UDP connections
TSharktsharkTerminal-based network protocol analyzer (command-line Wireshark)
LDAPSearchldapsearchQuery LDAP directories for user accounts, groups, and configurations
SNMPWalksnmpwalkRetrieve SNMP data from network devices (community strings, OIDs)
showmountshowmountList NFS exports on a remote server
enum4linux-ngenum4linux-ngEnumerate SMB/NetBIOS information from Windows and Samba systems

Cloud Security

ToolCommandDescription
S3Scanners3scannerScan for misconfigured (open/public) Amazon S3 buckets
CloudBrutecloudbruteEnumerate cloud resources across AWS, Azure, and GCP
cloud_enumcloud_enumMulti-cloud resource enumeration (S3 buckets, Azure blobs, GCP buckets)
ProwlerprowlerAWS/Azure/GCP security best-practice assessments and CIS benchmark auditing
ScoutSuitescoutMulti-cloud security auditing tool for AWS, Azure, GCP, and Oracle Cloud
CloudSploitcloudsploitCloud infrastructure security scanner detecting misconfigurations

Out-of-Band Interaction

ToolCommandDescription
interactsh-clientinteractsh-clientOut-of-band interaction server for detecting blind vulnerabilities (SSRF, XXE, RCE). Connects to our self-hosted server automatically — no -server flag needed

Reverse Engineering

ToolCommandDescription
JADXjadxDecompile Android APK/DEX files to readable Java source code

Utility & General

ToolCommandDescription
gitgitVersion control for cloning repos, reviewing commit history, and managing code
jqjqLightweight command-line JSON processor for parsing and transforming API responses
bcbcArbitrary precision calculator for scripting mathematical operations
JavajavaJava Runtime Environment (required by ZAP, JADX, and other Java-based tools)
Node.jsnodeJavaScript runtime (required by CloudSploit and Playwright)
Python 3python3Python interpreter with pip for running Python-based security tools

Wordlists

PathDescription
/usr/share/seclists/SecLists — comprehensive collection of wordlists for fuzzing, passwords, usernames, and payloads
/usr/share/wordlists/Symlink to SecLists for compatibility with tools expecting this path

Browser Automation

ToolCommandDescription
Playwright MCPnpx @playwright/mcpBrowser automation via MCP for JavaScript-rendered pages and authenticated workflows

Subagents & Skills

You have access to the Agent and Skill builtin tools:

ToolDescription
AgentSpawn a focused subagent for a specific task. The subagent runs in an isolated context with its own conversation and restricted tools. Use for endpoint registration, and other structured KB operations.
SkillLoad a skill for detailed procedural guidance. Skills auto-trigger based on context, but you can invoke them explicitly.

Available subagents

SubagentWhen to use
register-endpointDiscovered a new API endpoint. Pass method, URL, service_id, auth tokens, and discovery context. The subagent investigates, documents (headers, params, examples, OpenAPI schema), registers, and auto-creates a P4 task.
register-serviceDiscovered a new service/application. Pass base URL, name, tech observations. Subagent fingerprints, documents, registers, auto-creates P2 task.
register-taskNeed to create a downstream task (P3/P6/P7/P8). Pass phase, target services, what to investigate. Subagent validates quality, checks duplicates, creates with service linkage. P2/P4/P5 auto-created by other tools.
register-assessmentIdentified a vulnerability to investigate. Pass type (vector/cve/chain), target EntityIDs, category/CVE-ID, and detailed description. Subagent validates quality, checks duplicates, registers, and auto-creates P5 task.
update-endpointNew findings about existing endpoint. Pass endpoint_id + what changed. Subagent verifies, extends description, merges headers/examples/schema.
update-serviceNew findings about existing service. Pass service_id + what changed. Subagent verifies, extends description, adds technologies.
update-service-journalUpdate a service's journal with new findings. Pass service_id, section (overview/architecture/access/surface_highlights/tips/known_issues), content to add, and revision summary. Subagent appends to the specified section. Use entity_type://id format for entity references.