Whois
Footprinting
nmap
netcat
Web crawler
OWASP ZAP
Burp suite
Dig
Gobuster
Improper input validation
Brute force attack
Hydra
Database connection
Metasploit
Whois
Footprinting
nmap
netcat
Web crawler
OWASP ZAP
Burp suite
Dig
Gobuster
Improper input validation
Brute force attack
Hydra
Database connection
Metasploit