This chapter lists several security testing and attack simulation tools by type. These tools must be operated in a contained environment like an isolated network segment, or when used in other types of environments, they need to be executed with a well-defined, clear scope and duration explicitly authorized by the system’s owners.
Although some of these tools are presented as part of a category, they can also perform tasks from other categories.
It should be noted that most of these ...