# Tools and Services

This section contains practical guides for offensive security tools and service exploitation techniques commonly used during penetration testing and red team operations.

## Reconnaissance

Tools for information gathering and target enumeration:

* [**amass**](https://burmat.gitbook.io/security/hacking/tools-and-services/amass) - Subdomain enumeration and OSINT collection
* [**Shodan**](https://burmat.gitbook.io/security/hacking/tools-and-services/shodan) - Internet-connected device search engine for asset discovery

## Network Analysis

Tools for protocol analysis and credential extraction:

* [**tshark**](https://burmat.gitbook.io/security/hacking/tools-and-services/tshark) - Command-line packet analyzer for traffic inspection and credential harvesting
* [**VoIP**](https://burmat.gitbook.io/security/hacking/tools-and-services/voice-over-ip-voip) - Voice over IP exploitation techniques including SIP enumeration and call interception

## SMB/File Share Enumeration

* [**smbmap**](https://burmat.gitbook.io/security/hacking/tools-and-services/smbmap) - SMB share enumeration, credential testing, and file searching

## Service-Specific Exploitation

* [**Adobe Experience Manager (AEM)**](https://burmat.gitbook.io/security/hacking/tools-and-services/adobe-experience-manager-aem) - Enterprise CMS vulnerability scanning and exploitation
* [**ike-scan**](https://burmat.gitbook.io/security/hacking/tools-and-services/ike-scan) - IPSec VPN enumeration and pre-shared key extraction

## Data Processing

* [**jq**](https://burmat.gitbook.io/security/hacking/tools-and-services/jq) - JSON parsing for processing BloodHound and other tool outputs

## Productivity

* [**tmux**](https://burmat.gitbook.io/security/hacking/tools-and-services/tmux) - Terminal multiplexer setup with logging and automation
