Top 5 Tools

Nmap

Network discovery and service/version enumeration.

Burp Suite

Proxy-driven web security testing and request manipulation.

Metasploit

Exploit modules, payload generation, and post-exploitation.

Wireshark

Deep packet inspection and traffic anomaly analysis.

John the Ripper

Password hash auditing for strength validation and red team ops.