Which tool is NOT commonly used by hackers during the discovery phase to find vulnerabilities?

(Select The Best Answer)