Under Utilized Tools/Resources #2 Part 2 of under utilized or used tools and resources for penetration testing and hacking