Throughout this book, we've touched on tooling and workflows that have been chosen based on a combination of efficiency, cost, professional opinion, and personal preference. But there are a profusion of security tools that you can leverage beyond the short list we've covered in our walkthrough.
This chapter will cover both how to evaluate adopting new tools, as well as providing a simple overview of other useful Curate software, sites, communities, and educational resources. We'll cover everything from programs, such as scanners and Burp extensions, to crowd-sourced databases of attack snippets, such as SecLists.
The following topics will be covered in this chapter:
- Evaluating new tools
- Paid versus free editions
- A quick overview of Nikto, Kali, Burp extensions, and more