Is this your personal list? And is it in a specific order?
If so: curious why Wireshark is above tcpdump. Because it's more common to download a network capture file and analyze it locally with Wireshark? These files are created with tcpdump inside the breached network though, no?
Regarding tools I was looking for on this list: I only did pentesting in a lab but gobuster and LinPEAS were very helpful for each challenge so if I would create such a list, I would include them.
Since I don't know most of these tools in this list, which of them are for enumeration? Maybe you simply use other tools for the same purpose which are on this list.
gobuster
and LinPEAS were very helpful for each challenge so if I would create such a list, I would include them.