Tool entries

The coming tool entries I am listing have been used in unison with the Certified Ethical Hacker course. I realize that some of them are lacking in documentation or are somewhat lacking in features, however I feel that some of the best tools are those that serve a very simple and well defined purpose and have been used and cited as reliable by one of the most notable sources in IT security. I will try to list them with as much information as I am able to find.