This appendix contains a laundry list of hacking tools. Some of these tools allow you to automate your recon process, and others help you discover applications to attack. This list is not meant to be exhaustive; it only reflects tools I commonly use or know that other hackers use regularly. Also keep in mind that none of these tools should replace observation or intuitive thinking. Michiel Prins, co-founder of HackerOne, deserves credit for helping develop the initial version of this list and providing advice on how to effectively use tools when I started hacking.
Web proxies capture your web traffic so you can analyze requests ...