A cybersecurity professional shares a list of incredible pen-testing tools that find vulnerabilities in systems, networks, and web servers.