1. Nmap
  2. Netcat
  3. Metasploit