πŸ“‹

Penetration Testing

Compare 157 penetration testing tools to find the right one for your needs

πŸ“‚ Subcategories

πŸ”§ Tools

Compare and find the best penetration testing for your needs

Cymulate

Security Validation and Exposure Management Platform.

A comprehensive platform for continuous security validation, attack surface management, and exposure management.

View tool details β†’

usecure

The Human Risk Management (HRM) Platform.

A platform that helps businesses measure, reduce, and monitor human cyber risk.

View tool details β†’

Picus Security

The Security Validation Company.

A continuous security validation platform that helps organizations measure and enhance their cyber resilience by simulating real-world threats.

View tool details β†’

Bishop Fox Cosmos

The Attack Surface Management Platform.

A platform that combines attack surface management (ASM) with continuous automated testing to identify and prioritize high-risk exposures.

View tool details β†’

AttackForge

The Pentest Management Platform for Consultants & Enterprises.

A pentest management and collaboration platform designed for both security consultancies and enterprise security teams.

View tool details β†’

Astra Pentest

Pentesting as a service, tailored for your industry.

A comprehensive penetration testing platform combining automated scanning with manual expert testing.

View tool details β†’

Intruder

Stop breaches before they start.

An online vulnerability scanner that finds security weaknesses in your digital infrastructure.

View tool details β†’

Burp Suite Professional

The world's #1 web penetration testing toolkit.

A comprehensive toolkit for web application security testing.

View tool details β†’

NetSPI

Proactive Cyber Security | PTaaS, ASM, BAS.

A proactive security solution for discovering, prioritizing, and remediating security vulnerabilities.

View tool details β†’

BreachLock

Attack Surface Discovery & Penetration Testing.

A cloud-native platform for continuous attack surface discovery and penetration testing.

View tool details β†’

Burp Suite Professional

The world's #1 web penetration testing toolkit.

A comprehensive platform for performing security testing of web applications.

View tool details β†’

Nmap

The Network Mapper.

A free and open-source utility for network discovery and security auditing.

View tool details β†’

Burp Suite

The world's #1 web penetration testing toolkit.

A graphical tool for testing Web application security.

View tool details β†’

YesWeHack

The Global Bug Bounty & VDP Platform

A global bug bounty and vulnerability disclosure platform with a strong presence in Europe and Asia.

View tool details β†’

Intruder

The Proactive Vulnerability Scanner

A cloud-based vulnerability scanner that helps businesses to find and fix security weaknesses in their external infrastructure.

View tool details β†’

Pentest-Tools.com

Your Online Penetration Testing Toolkit

An online platform that provides a comprehensive suite of tools for penetration testing, vulnerability scanning, and security assessments.

View tool details β†’

PlexTrac

The Pentest Reporting & Collaboration Platform.

A platform for cybersecurity teams to streamline reporting and collaboration for penetration testing and vulnerability management.

View tool details β†’

Intruder

The proactive vulnerability scanner that finds your security weaknesses, before the hackers do.

An online vulnerability scanner that helps businesses find and fix cybersecurity weaknesses in their external infrastructure.

View tool details β†’

Astra Pentest

Your Go-To Pentesting Company.

A comprehensive penetration testing suite that combines automated scanning with manual pentesting by security experts.

View tool details β†’

Burp Suite

The leading toolkit for web security testing.

A graphical tool for testing Web application security. It is the industry standard for manual penetration testing of web applications.

View tool details β†’

Synack

The Premier Security Testing Platform.

A security testing platform that combines the power of human intelligence with artificial intelligence to find and fix vulnerabilities.

View tool details β†’

Nmap

The Network Mapper.

A free and open-source utility for network discovery and security auditing.

View tool details β†’

Burp Suite

The leading toolkit for web security testing.

A comprehensive platform for performing security testing of web applications.

View tool details β†’

Acrylic Wi-Fi

Wi-Fi scanner to analyze and survey wireless networks.

A suite of Wi-Fi analysis tools for Windows, including a scanner, heatmapper, and protocol analyzer.

View tool details β†’

PlexTrac

The Proactive Security Management Platform.

A platform for pentest reporting, automated remediation tracking, and proactive security management.

View tool details β†’

Horizon3.ai NodeZero

The Autonomous Pentesting Platform.

An autonomous penetration testing platform that continuously assesses an enterprise's attack surface to find and fix exploitable vulnerabilities.

View tool details β†’

Lumu Technologies

The Continuous Compromise Assessment Company.

A platform that continuously collects and analyzes network metadata to confirm active compromises in real-time.

View tool details β†’

Ironscales

The AI-Powered Email Security Platform.

An email security platform that combines AI and human insights to protect against phishing.

View tool details β†’

Hoxhunt

Human Risk Management Platform.

A gamified security awareness and phishing training platform that rewards employees for reporting threats.

View tool details β†’

Wireshark

The world’s foremost and widely-used network protocol analyzer.

A powerful, open-source network protocol analyzer used for troubleshooting, analysis, and security auditing.

View tool details β†’

Cobalt Strike

Adversary Simulations and Red Team Operations.

A post-exploitation agent and command and control (C2) framework for adversary simulations and red team operations.

View tool details β†’

Infection Monkey

An open-source breach and attack simulation (BAS) tool.

An open-source, self-propagating breach and attack simulation tool that maps an organization's network and tests for security weaknesses.

View tool details β†’

Metasploit Framework

The World's Most Used Penetration Testing Framework.

An open-source penetration testing framework for developing, testing, and executing exploit code against remote targets.

View tool details β†’

Cobalt.io

Modernize traditional offensive security with global talent and a SaaS platform to deliver better security.

A Pentest as a Service (PtaaS) platform that connects businesses with a community of vetted pentesters.

View tool details β†’

Pentest-Tools.com

Pentesting & vulnerability assessment toolkit.

A web-based platform with a collection of tools for penetration testing and vulnerability assessment.

View tool details β†’

Cobalt Strike

Adversary Simulations and Red Team Operations.

A commercial threat emulation tool for post-exploitation and advanced adversary simulation.

View tool details β†’

Wireshark

The world’s foremost and widely-used network protocol analyzer.

A fundamental tool for network analysis, troubleshooting, and security.

View tool details β†’

Intigriti

The European leader in bug bounty and vulnerability disclosure.

A European bug bounty and vulnerability disclosure platform that connects companies with ethical hackers.

View tool details β†’

Cobalt.io

Pentest as a Service (PtaaS)

A Pentest as a Service (PtaaS) platform that connects businesses with a community of trusted penetration testers.

View tool details β†’

GitGuardian

The Code Security Platform for the DevOps Generation

A code security platform that helps developers to find and fix secrets and other security vulnerabilities in their code.

View tool details β†’

Cobalt

Pentest as a Service.

A Pentest as a Service (PtaaS) platform that connects businesses with a community of vetted penetration testers.

View tool details β†’

Pentera

Automated Security Validation.

An automated security validation platform that emulates the entire cyberattack kill chain to safely test the effectiveness of security controls.

View tool details β†’

Dradis

The Collaboration and Reporting Tool for InfoSec Teams.

An open-source framework for information security teams to share information and collaborate on security assessments.

View tool details β†’

HackerOne

The Hacker-Powered Security Platform.

A hacker-powered security platform that connects businesses with a global community of ethical hackers to find and fix vulnerabilities.

View tool details β†’

Cobalt Strike

Adversary Simulations and Red Team Operations.

A post-exploitation agent and command and control framework for red team operations and adversary simulations.

View tool details β†’

CyCognito

The External Attack Surface Management Platform.

An external attack surface management (EASM) platform that helps organizations to discover, prioritize, and eliminate their most critical security risks.

View tool details β†’

Metasploit Framework

The world’s most used penetration testing framework.

A comprehensive penetration testing tool with significant social engineering capabilities.

View tool details β†’

Metasploit Pro

The world's most used penetration testing framework.

A penetration testing platform for security teams to verify vulnerabilities and manage security assessments.

View tool details β†’

Pentera

Automated Security Validation & Exposure Management.

An automated security validation platform that emulates real-world attacks to test cybersecurity defenses.

View tool details β†’

HackerOne

Global leader in offensive security | Security for AI | Crowdsourced Security.

A crowdsourced security platform that connects businesses with a global community of ethical hackers.

View tool details β†’

Bugcrowd

#1 Crowdsourced Cybersecurity Platform.

A crowdsourced security platform that connects organizations with a global network of security researchers.

View tool details β†’

Synack

The Premier Security Testing Platform.

A security testing platform that combines human expertise with AI-driven technology.

View tool details β†’

Secureworks

Cybersecurity Leader, Proven Threat Defense.

A cybersecurity company that provides intelligence-driven security solutions.

View tool details β†’

OWASP ZAP

The world's most popular free web security tool.

An open-source web application security scanner.

View tool details β†’

Metasploit Framework

The world's most used penetration testing framework.

An open-source platform for developing, testing, and executing exploit code against remote targets.

View tool details β†’

Kali Linux

The most advanced penetration testing distribution.

A Debian-based Linux distribution with a vast collection of pre-installed security tools.

View tool details β†’

Metasploit Framework

The World's Most Used Penetration Testing Framework.

An open-source penetration testing framework with a vast database of exploits and payloads.

View tool details β†’

HackerOne

The Bug Bounty & VDP Platform

A vulnerability coordination and bug bounty platform that connects businesses with penetration testers and cybersecurity researchers.

View tool details β†’

Synack

The Premier Security Testing Platform

A security testing platform that combines human intelligence with AI to deliver on-demand penetration testing and vulnerability disclosure.

View tool details β†’

Metasploit

The World's Most Used Penetration Testing Framework.

An open-source penetration testing framework that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

View tool details β†’

Invicti

Application Security for Every Organization.

A web application security scanner that provides automated and continuous application security testing.

View tool details β†’

Bugcrowd

The Leader in Crowdsourced Cybersecurity.

A crowdsourced cybersecurity platform that connects organizations with a global network of security researchers to find and fix vulnerabilities.

View tool details β†’

OWASP ZAP

The World's Most Popular Free Web Security Tool.

An open-source web application security scanner. It is intended to be used by both those new to application security as well as professional penetration testers.

View tool details β†’

Detectify

The External Attack Surface Management Platform Powered by Elite Hackers.

An external attack surface management (EASM) platform that combines automation with crowdsourced hacker research to find and fix vulnerabilities.

View tool details β†’

KnowBe4 Security Awareness Training

The world's largest integrated platform for security awareness training combined with simulated phishing attacks.

Platform for security awareness training and simulated phishing attacks to manage social engineering.

View tool details β†’

Proofpoint Security Awareness Training

Change behavior and reduce risk with a people-centric approach.

A comprehensive security awareness solution that educates employees on cybersecurity best practices.

View tool details β†’

Infosec IQ (from Fortra)

Personalized security awareness and anti-phishing training.

A security awareness platform that combines phishing simulations with personalized training.

View tool details β†’

LUCY Security

Test, train and engage your employees.

A platform for phishing simulations, security awareness training, and IT defense testing.

View tool details β†’

Metasploit Framework

The world's most used penetration testing framework.

An open-source platform for developing, testing, and executing exploit code against remote targets.

View tool details β†’

Ekahau

The Global Leader in Wi-Fi Design and Measurement.

A suite of professional hardware and software tools for Wi-Fi design, analysis, and troubleshooting.

View tool details β†’

NetAlly

Your Ally for Network Testing.

A provider of handheld network testing tools for Wi-Fi and wired network analysis and troubleshooting.

View tool details β†’

Nessus

The #1 Vulnerability Assessment Solution.

A leading vulnerability scanner used to identify vulnerabilities, misconfigurations, and malware across various assets.

View tool details β†’

AttackIQ

The Security Optimization Platform.

A breach and attack simulation (BAS) platform that continuously validates security controls against real-world threats.

View tool details β†’

Pentera

The Automated Security Validation Platform.

An automated platform that mimics a hacker's entire attack kill chain to validate security controls and identify exploitable vulnerabilities.

View tool details β†’

SafeBreach

The Continuous Security Validation Platform.

A breach and attack simulation (BAS) platform that provides a 'hacker's view' of the enterprise to validate security controls.

View tool details β†’

Acunetix

Web Application Security Scanner.

An automated web vulnerability scanner that helps businesses secure their websites, web applications, and APIs.

View tool details β†’

Rapid7

Endpoint to Cloud, Command Your Attack Surface.

A cybersecurity company that provides a range of security solutions, including vulnerability management and penetration testing.

View tool details β†’

Tenable

The Cyber Exposure Company.

A cybersecurity company that provides solutions for vulnerability management and cyber exposure.

View tool details β†’

Veracode

Application Risk Management Engineered for the AI-Coding Era.

An application security platform that helps organizations secure their software.

View tool details β†’

Core Impact

Professional Pen Testing Tools: Guided Automation and Certified Exploits.

A commercial penetration testing tool for identifying and exploiting vulnerabilities across various vectors.

View tool details β†’

Bugcrowd

The Leader in Crowdsourced Cybersecurity

A crowdsourced security platform that connects organizations with a global network of security researchers to identify vulnerabilities.

View tool details β†’

Detectify

The External Attack Surface Management Platform

An external attack surface management platform that combines automation with human expertise to find and remediate vulnerabilities.

View tool details β†’

Invicti Security

Application Security for Every Organization

An application security platform that provides DAST, IAST, and SCA solutions to help organizations secure their web applications.

View tool details β†’

Nessus

The #1 Vulnerability Assessment Solution.

A proprietary vulnerability scanner developed by Tenable, Inc. It is one of the most widely used vulnerability scanners in the world.

View tool details β†’

Acunetix

The Automated Web Application Security Testing Tool.

An automated web vulnerability scanner that detects and reports on a wide range of web application vulnerabilities.

View tool details β†’

Rapid7

Advancing Security.

A provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cyber security.

View tool details β†’

Cofense PhishMe

Empower employees to be your last line of defense with industry-proven behavioral conditioning methods.

A SaaS platform that conditions employees to recognize and report phishing attacks through realistic simulations.

View tool details β†’

Terranova Security (from Fortra)

Change user behaviors. Reduce cyber risk. Secure critical data.

A security awareness training platform focused on changing unsafe online behaviors.

View tool details β†’

Checkmarx

Unified Agentic AppSec Testing, Monitoring & Remediation Platform.

An enterprise application security platform for identifying and remediating vulnerabilities in software.

View tool details β†’

Core Impact

Penetration Testing Software.

A commercial penetration testing tool for identifying and exploiting vulnerabilities across various vectors.

View tool details β†’

Acunetix

The Web Application Security Scanner

An automated web vulnerability scanner that helps businesses to find and fix security flaws in their websites and web applications.

View tool details β†’

Veracode

The Application Security Company

A comprehensive application security platform that provides a wide range of solutions for securing the entire software development lifecycle.

View tool details β†’

Core Impact

The Most Comprehensive Penetration Testing Software.

A penetration testing software that allows you to replicate attacks that pivot across systems, devices, and applications.

View tool details β†’

Qualys

The All-in-One Cloud-Based Security and Compliance Platform.

A cloud-based platform that provides a suite of security and compliance solutions, including vulnerability management, web application scanning, and endpoint detection and response.

View tool details β†’

Maltego

The world’s leading platform for open-source intelligence (OSINT) investigations.

An OSINT and graphical link analysis tool for gathering and connecting information.

View tool details β†’

inSSIDer

The Wi-Fi Scanner that shows you the whole picture.

A Wi-Fi scanning tool for Windows and macOS that helps visualize and troubleshoot wireless networks.

View tool details β†’

OpenVAS

The world's most advanced open-source vulnerability scanner.

An open-source vulnerability scanning and management framework.

View tool details β†’

Qualys

IT, Security and Compliance in a Single App.

A cloud-based platform for IT, security, and compliance.

View tool details β†’

Scythe

Adversary Emulation Platform.

An adversary emulation platform that helps red, blue, and purple teams build and emulate real-world cyber attacks.

View tool details β†’

Phishing Frenzy

Ruby on Rails Phishing Framework.

An open-source phishing and security awareness training framework.

View tool details β†’

Fluxion

A social engineering wireless auditing tool.

A script that automates social engineering attacks to retrieve WPA/WPA2 keys.

View tool details β†’

Pyrit

The WPA/WPA2-PSK Cracker.

A powerful open-source tool that specializes in cracking WPA/WPA2-PSK keys using GPU acceleration.

View tool details β†’

CoWPAtty

WPA-PSK dictionary attack tool.

A classic command-line tool for running an offline dictionary attack against WPA/WPA2-PSK.

View tool details β†’

theHarvester

E-mails, subdomains and names Harvester.

An OSINT tool for gathering emails, subdomains, hosts, and names from public sources.

View tool details β†’

Recon-ng

A full-featured Web Reconnaissance framework written in Python.

A modular web reconnaissance framework for open-source intelligence gathering.

View tool details β†’

SpiderFoot

Automated OSINT for Attack Surface Management.

An open-source and commercial OSINT automation tool for reconnaissance and threat intelligence.

View tool details β†’

Mandiant Security Validation

Validate your security effectiveness with threat intelligence-led controls validation.

A security validation platform that tests security controls using real-world attack emulations based on Mandiant's threat intelligence.

View tool details β†’

CanIPhish

Next-Generation Phishing Simulation.

A phishing simulation and security awareness platform focused on real-world scenarios.

View tool details β†’

Evilginx2

Standalone man-in-the-middle attack framework for phishing login credentials along with session cookies.

A man-in-the-middle framework used to phish credentials and session cookies, bypassing 2FA.

View tool details β†’

Aircrack-ng

A complete suite of tools to assess Wi-Fi network security.

An open-source command-line tool for Wi-Fi network security auditing and penetration testing.

View tool details β†’

Kismet

A wireless network detector, sniffer, and intrusion detection system.

An open-source tool for detecting wireless networks, sniffing traffic, and identifying potential threats.

View tool details β†’

Wifite

An automated wireless attack tool.

A Python script that automates the process of attacking WEP, WPA, and WPS encrypted networks.

View tool details β†’

VECTR

Track your Red and Blue Team engagements.

An open-source tool for tracking red team engagements, purple team exercises, and blue team defensive capabilities against TTPs.

View tool details β†’

Reaver

A tool to perform a brute force attack against Wi-Fi Protected Setup (WPS) registrar PINs.

An open-source tool that exploits a vulnerability in WPS to recover WPA/WPA2 passphrases.

View tool details β†’

Atomic Red Team

A library of simple tests to execute atomic checks of security controls.

An open-source library of tests mapped to the MITRE ATT&CK framework, used to validate security controls.

View tool details β†’

Fern Wifi Cracker

A Wireless Security Auditing and Attack Software.

A GUI-based tool for wireless security auditing that simplifies attacks on WEP, WPA, and WPS.

View tool details β†’

Prelude Operator

Continuous security testing for everyone.

An open-source platform for continuous security testing, providing a library of TTPs and runners to execute them.

View tool details β†’

Brute Ratel C4

A Customized Command and Control Center.

An advanced command and control (C2) framework designed for red team operations with a strong focus on evading EDR and AV detection.

View tool details β†’

Airgeddon

A multi-use bash script for Linux systems to audit wireless networks.

A menu-driven bash script that wraps numerous wireless security tools into a single, powerful interface.

View tool details β†’

MITRE CALDERA

An automated adversary emulation system.

An open-source adversary emulation platform that can be used to test endpoint security solutions and assess a network's security posture.

View tool details β†’

Empire

A post-exploitation framework.

An open-source post-exploitation framework that includes a pure PowerShell agent for Windows and a Python agent for Linux/macOS.

View tool details β†’

Covenant

A .NET command and control framework.

An open-source, .NET-based command and control framework designed for red team operations, with a focus on usability.

View tool details β†’

Wifiphisher

The Rogue Access Point Framework.

A security tool that mounts automated phishing attacks against Wi-Fi networks to obtain credentials.

View tool details β†’

zANTI

Mobile Penetration Testing.

A mobile application for Android that performs network security assessments.

View tool details β†’

ThreatGen Red vs. Blue

Cybersecurity Gamification.

A gamified cybersecurity training platform that includes a Red vs. Blue game for hands-on offensive and defensive skills development.

View tool details β†’

Sliver

An open source cross-platform adversary emulation/red team framework.

An open-source, cross-platform command and control (C2) framework developed by Bishop Fox, designed for red team operations.

View tool details β†’

sqlmap

Automatic SQL injection and database takeover tool.

An open-source tool that automates detecting and exploiting SQL injection flaws.

View tool details β†’

Social-Engineer Toolkit (SET)

An open-source penetration testing framework designed for social engineering.

A Python-driven tool aimed at penetration testing around social engineering.

View tool details β†’

BeEF (Browser Exploitation Framework)

The Browser Exploitation Framework.

A penetration testing tool that focuses on the web browser.

View tool details β†’

PowerShell Empire

A post-exploitation framework.

A pure PowerShell post-exploitation agent, now merged with Python-based Empyre.

View tool details β†’

Scapy

A powerful interactive packet manipulation program.

A Python-based library and tool for low-level network packet manipulation.

View tool details β†’

Immunity CANVAS

The Premier Exploit Development Platform.

A commercial exploit development framework for penetration testers and security professionals.

View tool details β†’

Routersploit

Exploitation Framework for Embedded Devices.

An open-source framework dedicated to exploiting vulnerabilities in embedded devices.

View tool details β†’

Brute Ratel C4

A Customized Command and Control Center.

A commercial adversary emulation and red team framework.

View tool details β†’

Sliver

An open source cross-platform adversary emulation/red team framework.

A powerful open-source C2 framework developed by Bishop Fox.

View tool details β†’

Havoc

A modern and malleable post-exploitation command and control framework.

An open-source, modern, and malleable post-exploitation C2 framework.

View tool details β†’

Mythic

A collaborative, multi-platform, C2 framework.

A highly extensible, open-source C2 framework for red teams.

View tool details β†’

Covenant

A .NET command and control framework.

An open-source C2 framework that uses .NET and Blazor.

View tool details β†’

Nighthawk

An advanced C2 framework for red teaming.

A highly advanced, commercially available C2 framework focused on stealth and evasion.

View tool details β†’

Armitage

A graphical cyber attack management tool for Metasploit.

A GUI front-end for the Metasploit Framework for visualization and team collaboration.

View tool details β†’

Pocsuite3

An open-sourced remote vulnerability testing and proof-of-concept development framework.

An open-source framework for writing and testing proofs-of-concept (PoCs).

View tool details β†’

Exploit Pack

Your partner in cyber security.

An open-source and commercial exploit framework with a focus on exploit development.

View tool details β†’

Aircrack-ng

A complete suite of tools to assess WiFi network security.

A framework of tools for auditing and cracking wireless networks.

View tool details β†’

Cobalt Strike

Adversary Simulations and Red Team Operations.

A popular, commercial threat emulation tool for red team operations and adversary simulations.

View tool details β†’

Brute Ratel C4

A Customized Command and Control Center.

A commercial adversary emulation tool designed for stealth and evasion of EDR and AV solutions.

View tool details β†’

Sliver

Adversary Emulation Framework.

An open-source, cross-platform adversary emulation/red team framework.

View tool details β†’

PoshC2

A proxy aware C2 framework.

An open-source, cross-platform C2 framework written in Python and PowerShell.

View tool details β†’

Open Bug Bounty

The world's first free, open and community-driven bug bounty platform.

A non-profit bug bounty platform that allows security researchers to report vulnerabilities and website owners to receive them for free.

View tool details β†’

Federacy

Crowdsourced Security Testing

A bug bounty platform that connects businesses with a community of ethical hackers for on-demand security testing.

View tool details β†’

Yogosha

The Elite Cybersecurity Platform

A private bug bounty and vulnerability disclosure platform that connects organizations with a curated community of elite security researchers.

View tool details β†’

HackenProof

Bug Bounty Platform for Crypto and DeFi

A bug bounty platform that specializes in the security of blockchain and DeFi projects.

View tool details β†’

SafeHats

Crowdsourced Application Security Testing

A bug bounty platform that provides crowdsourced security testing for businesses of all sizes.

View tool details β†’

Immunefi

The leading bug bounty platform for Web3.

A bug bounty platform that specializes in securing DeFi protocols and smart contracts.

View tool details β†’

Hacker Target

Online Vulnerability Scanners and Network Intelligence Tools

An online platform that provides a suite of tools for network scanning, vulnerability assessment, and security reconnaissance.

View tool details β†’

Social-Engineer Toolkit (SET)

An open-source penetration testing framework designed for social engineering.

A Python-driven, open-source tool for simulating various types of social engineering attacks.

View tool details β†’

Gophish

Open-Source Phishing Framework.

An open-source phishing toolkit designed for businesses and penetration testers.

View tool details β†’

King Phisher

Phishing Campaign Toolkit.

An open-source tool for testing and promoting user awareness by simulating real-world phishing attacks.

View tool details β†’