Some of the popular tools used by hackers and penetration testers when doing network analysis or carrying out attacks. These tools work in real life situations and should be used cautiously. If these tools are misused they can cause actual harm to IT infrastructure which could lead to prosecution. Please only use these tools on networks which you own or have permission to test. I am not responsible for your actions! Knowledge is power but with great power comes great responsibility, use wisely.