Because it is based on the Kali Linux OS, many of the tools that we have explored over the previous chapters are part of the NetHunter platform. As a result, the same commands and techniques can be employed during a penetration test. In the next section, we will address two tools that are the most often utilized in penetration testing, as well as examining some of the additional tools that can be made part of an individual NetHunter platform.