Tools that Power the security Assessment Process

Metasploit
Nmap
Hydra
Exploit Db
Wazuh
Kali Linux
Burp Suite
John The Ripper
Maltego
Parrot OS