Skip to content

Application Management

Arrow Control includes a tool library with 30+ pre-configured security and penetration testing applications. Install professional-grade tools with a single click—no manual setup required.

  1. Log into Arrow Control
  2. Click Apps in the sidebar navigation
  3. The tool library opens showing available applications
Screenshot Coming Soon
🖥️ App management interface showing available security tools Screenshot

The tool library provides:

  • Pre-configured tools - Tested and ready to use
  • Categorized organization - Tools grouped by function
  • One-click installation - Automated setup process
  • Verification badges - Indicates tested and confirmed working tools

Tools are organized into six categories:

CategoryDescriptionExample Tools
ReconnaissanceInformation gathering and discoveryNmap, Subfinder, Amass
Vulnerability ScanningAutomated vulnerability detectionNuclei, Nikto
Web Application TestingWeb security assessment toolsBurp Suite, SQLmap, Ffuf
Network ToolsNetwork analysis and protocol toolsWireshark, Aircrack-ng, Impacket
Exploitation FrameworksPost-exploitation and privilege escalationMetasploit, John the Ripper, Hashcat
Digital ForensicsForensic analysis and investigationLinPEAS, WinPEAS
  1. Click a category tab to filter tools
  2. Only tools in that category display
  3. Click All to show all tools
  1. Type in the search box
  2. Results filter as you type
  3. Matches tool names and descriptions
Screenshot Coming Soon
🖥️ Tool browser with category filter and search Screenshot
StatusIndicatorMeaning
Not InstalledGrayTool available but not installed
InstallingSpinningInstallation in progress
InstalledGreen checkmarkTool ready to use
Update AvailableOrange badgeNewer version available
  1. Browse or search for the desired tool
  2. Click the tool card to view details
  3. Review the tool description and category
  4. Click Install
  5. Monitor installation progress
  6. Receive completion notification
Screenshot Coming Soon
🖥️ Tool installation progress indicator Screenshot

During installation:

  • Progress indicator shows current status
  • Installation logs display in real-time
  • Success or failure notification on completion
  • Tool status updates to “Installed” when complete

Different tools use different installation methods, but all are automated:

MethodUsed ForExamples
System PackageStandard Linux packagesNmap, Wireshark, John
Go InstallGo-based toolsNuclei, Subfinder, httpx
Python (PIPX)Python tools in isolationDirsearch, CrackMapExec
Git CloneRepository-based toolsSecLists, Impacket
Rust (Cargo)Rust-based toolsRustScan, Feroxbuster
Direct DownloadPre-built binariesBurp Suite, OWASP ZAP

Note: Installation methods are handled automatically. Simply click Install and the system manages dependencies and setup.

ToolDescriptionCommand
NmapNetwork discovery and security auditingnmap
MasscanFast TCP port scannermasscan
SubfinderFast subdomain discoverysubfinder
AmassAttack surface mapping and asset discoveryamass
GobusterDirectory and DNS brute-forcinggobuster
ToolDescriptionCommand
NucleiYAML-based vulnerability scannernuclei
NiktoWeb server scannernikto
ToolDescriptionCommand
SQLmapSQL injection and database takeoversqlmap
FfufFast web fuzzerffuf
FeroxbusterRecursive content discoveryferoxbuster
Burp SuiteWeb vulnerability scanner and proxyjava -jar /opt/burpsuite/burpsuite_community.jar
OWASP ZAPWeb application security scanner/opt/zap/zap.sh
ToolDescriptionCommand
WiresharkNetwork protocol analyzerwireshark
Aircrack-ngWiFi network security toolsaircrack-ng
ImpacketPython network protocol libraryScripts in /opt/impacket
ToolDescriptionCommand
MetasploitExploitation frameworkmsfconsole
John the RipperPassword crackerjohn
HashcatAdvanced password recoveryhashcat
CrackMapExecActive Directory post-exploitationcrackmapexec
Screenshot Coming Soon
🖥️ Popular tools section showing commonly used applications Screenshot
  1. Click the Installed filter button
  2. Only installed tools display
  3. View installation date and version
Screenshot Coming Soon
🖥️ Installed tools view showing tool status and actions Screenshot
  1. Locate the installed tool
  2. Click Uninstall in the tool card
  3. Confirm removal
  4. Tool is removed from the system

Tools marked with a Verified badge have been:

  • Tested on Arrow VMs
  • Confirmed working with automated installation
  • Validated for expected functionality

Non-verified tools may still work but have not been formally tested.

After installation, tools are available in the terminal:

  1. Open a terminal session in Arrow Control
  2. Type the tool command (e.g., nmap, sqlmap, nuclei)
  3. The tool executes with its help or interface
Terminal window
# Example: Run Nmap scan
nmap -sV 192.168.1.1
# Example: Run Nuclei scan
nuclei -u https://example.com
# Example: Run SQLmap
sqlmap -u "https://example.com/page?id=1"
MethodDefault Location
System packagesStandard PATH (/usr/bin, /usr/local/bin)
Go tools~/go/bin
PIPX tools~/.local/bin
Git repositories/opt/[tool-name]
Direct downloads/opt/[tool-name]

Note: Refer to each tool’s documentation for usage instructions and options.

The tool library includes essential wordlists for security testing:

ResourceDescriptionLocation
SecListsCollection of multiple security testing lists/opt/SecLists
WordlistsCommonspeak2 wordlists/opt/wordlists

Use these with tools like Gobuster, Ffuf, and John:

Terminal window
# Directory brute-force with SecLists
gobuster dir -u https://example.com -w /opt/SecLists/Discovery/Web-Content/common.txt
# Password cracking with wordlist
john --wordlist=/opt/SecLists/Passwords/Common-Credentials/10k-most-common.txt hashes.txt
IssueSolution
Installation failsCheck disk space (df -h). Verify network connectivity. Review installation logs for errors.
Tool not found after installOpen a new terminal session. Check if tool is in PATH. For Go tools, verify ~/go/bin is in PATH.
Permission errorsSome tools require sudo. Check tool documentation for privilege requirements.
Installation stuckNetwork timeout possible. Cancel and retry. Check internet connectivity.
Dependencies missingRe-run installation—dependencies install automatically. Report persistent issues.
Tool crashes on startupVerify system requirements. Check available memory. Review tool documentation.
  • Install only needed tools - Avoid bloating the system with unused applications
  • Review tool descriptions - Understand what each tool does before installing
  • Monitor disk space - Some tools and wordlists are large
  • Keep tools updated - Re-install or update when new versions are available
  • Remove unused tools - Free up space by uninstalling tools no longer needed
  • Use tools responsibly - Only test systems you own or have explicit permission to test

Warning: Security and penetration testing tools are powerful and can cause harm if misused.

  • Authorization required - Only use these tools on systems you own or have explicit written permission to test
  • Legal implications - Unauthorized access to computer systems is illegal in most jurisdictions
  • Professional responsibility - Follow ethical guidelines and industry standards
  • Scope limitations - Stay within the boundaries of your authorized testing scope

Misuse of these tools may result in legal consequences. Always obtain proper authorization before testing.