Massive list of all cybersecurity tools [Paid and Free]

Each day new cybersecurity tools are being developed, and to keep track of all those tool, you can use this massive list of cybersecurity tools. The cybersecurity tools that are listed here have been collected from the web, meaning that they all have their own maintainers and developers. Some of the tools that you will find in the list are premium tools, while others are free.

Another interesting point is the fact that environments like Github.com contain thousands of interesting cybersecurity tools that need to be discovered. We have tried our best to list all the tools in this massive list.

Some of our readers will know that we publish a cybersecurity list each year, and this list is going to be our massive cybersecurity list of 2018.

Information Gathering Tools

In this list below, we will keep track of Information Gathering tools that you can use to obtain additional information about certain selected environments. These tools can assist you in getting a better view of the network. Allowing you to take well based decisions, simply because you have a good view of the network.

Name Free Trial Paid Windows Linux macOS Genre
acccheck x x Information gathering
ace-voip x x Information gathering
Amap x x Information gathering
arp-scan x x Information gathering
Automater x x Information gathering
bing-ip2hosts x x Information gathering
braa x x Information gathering
CaseFile x x Information gathering
CDPSnarf x x Information gathering
cisco-torch x x Information gathering
Cookie Cadger x x Information gathering
copy-router-config x x Information gathering
DMitry x x Information gathering
dnmap x x Information gathering
dnsenum x x Information gathering
dnsmap x x Information gathering
DNSRecon x x Information gathering
dnstracer x x Information gathering
dnswalk x x Information gathering
DotDotPwn x x Information gathering
enum4linux x x Information gathering
enumIAX x x Information gathering
EyeWitness x x Information gathering
Faraday x x Information gathering
Fierce x x Information gathering
Firewalk x x Information gathering
fragroute x x Information gathering
fragrouter x x Information gathering
Ghost Phisher x x Information gathering
GoLismero x x Information gathering
goofile x x Information gathering
hping3 x x Information gathering
ident-user-enum x x Information gathering
InSpy x x Information gathering
InTrace x x Information gathering
iSMTP x x Information gathering
lbd x x Information gathering
Maltego Teeth x x Information gathering
masscan x x Information gathering
Metagoofil x x Information gathering
Miranda x x Information gathering
nbtscan-unixwiz x x Information gathering
Nmap x x Information gathering
ntop x x Information gathering
OSRFramework x x Information gathering
p0f x x Information gathering
Parsero x x Information gathering
Recon-ng x x Information gathering
SET x x Information gathering
SMBMap x x Information gathering
smtp-user-enum x x Information gathering
snmp-check x x Information gathering
SPARTA x x Information gathering
sslcaudit x x Information gathering
SSLsplit x x Information gathering
sslstrip x x Information gathering
SSLyze x x Information gathering
Sublist3r x x Information gathering
THC-IPV6 x x Information gathering
theHarvester x x Information gathering
TLSSLed x x Information gathering
twofi x x Information gathering
URLCrazy x x Information gathering
Wireshark x x Information gathering
WOL-E x x Information gathering
Xplico x x Information gathering

The Information Gathering tools above can be downloaded from their official sites, just do remind yourself to read the documentation of these tools.

Passwords

In certain cases it is important to have strong tools that can help you recover passwords. In this list, we have listed down dozens of password cybersecurity tools that must help you forward.

Name Free Trial Paid Windows Linux macOS Genre
John the Tipper x x Passwords
Hash suite x x x Passwords
acccheck x x Passwords
BruteSpray x x Passwords
Burp Suite x x Passwords
CeWL x x Passwords
chntpw x x Passwords
cisco-auditing-tool x x Passwords
CmosPwd x x Passwords
creddump x x Passwords
crowbar x x Passwords
crunch x x Passwords
DBPwAudit x x Passwords
findmyhash x x Passwords
gpp-decrypt x x Passwords
hash-identifier x x Passwords
Hashcat x x Passwords
HexorBase x x Passwords
THC-Hydra x x Passwords
John the Ripper x x Passwords
Johnny x x Passwords
keimpx x x Passwords
Maltego Teeth x x Passwords
Maskprocessor x x Passwords
multiforcer x x Passwords
Ncrack x x Passwords
oclgausscrack x x Passwords
ophcrack x x Passwords
PACK x x Passwords
patator x x Passwords
phrasendrescher x x Passwords
polenum x x Passwords
RainbowCrack x x Passwords
rcracki-mt x x Passwords
RSMangler x x Passwords
SQLdict x x Passwords
Statsprocessor x x Passwords
THC-pptp-bruter x x Passwords
TrueCrack x x Passwords
WebScarab x x Passwords
wordlists x x Passwords
zaproxy x x Passwords

Research & Reverse Engineering

The reverse engineering tools below have noted themselves down as reliable and strong tools. Try them out.

Name Free Trial Paid Windows Linux macOS Genre
apktool x x Reverse Engineering
dex2jar x x Reverse Engineering
diStorm3 x x Reverse Engineering
edb-debugger x x Reverse Engineering
jad x x Reverse Engineering
javasnoop x x Reverse Engineering
JD-GUI x x Reverse Engineering
OllyDbg x x Reverse Engineering
smali x x Reverse Engineering
Valgrind x x Reverse Engineering
YARA x x Reverse Engineering

Sniffing and Spoofing

In some cases, you want to be able to sniff and spoof certain devices or environments. The tools below will help you forward.

Name Free Trial Paid Windows Linux macOS Genre
Burp Suite x x Sniffing & Spoofing
DNSChef x x Sniffing & Spoofing
fiked x x Sniffing & Spoofing
hamster-sidejack x x Sniffing & Spoofing
HexInject x x Sniffing & Spoofing
iaxflood x x Sniffing & Spoofing
inviteflood x x Sniffing & Spoofing
iSMTP x x Sniffing & Spoofing
isr-evilgrade x x Sniffing & Spoofing
mitmproxy x x Sniffing & Spoofing
ohrwurm x x Sniffing & Spoofing
protos-sip x x Sniffing & Spoofing
rebind x x Sniffing & Spoofing
responder x x Sniffing & Spoofing
rtpbreak x x Sniffing & Spoofing
rtpinsertsound x x Sniffing & Spoofing
rtpmixsound x x Sniffing & Spoofing
sctpscan x x Sniffing & Spoofing
SIPArmyKnife x x Sniffing & Spoofing
SIPp x x Sniffing & Spoofing
SIPVicious x x Sniffing & Spoofing
SniffJoke x x Sniffing & Spoofing
SSLsplit x x Sniffing & Spoofing
sslstrip x x Sniffing & Spoofing
THC-IPV6 x x Sniffing & Spoofing
VoIPHopper x x Sniffing & Spoofing
WebScarab x x Sniffing & Spoofing
Wifi Honey x x Sniffing & Spoofing
Wireshark x x Sniffing & Spoofing
xspy x x Sniffing & Spoofing
Yersinia x x Sniffing & Spoofing
zaproxy x x Sniffing & Spoofing

Stress testing

If you want to stress test your own environment, then do make a selection out of the tools below. These tools all have stress testing capabilities.

Name Free Trial Paid Windows Linux macOS Genre
DHCPig x x Stress Testing
FunkLoad x x Stress Testing
iaxflood x x Stress Testing
Inundator x x Stress Testing
inviteflood x x Stress Testing
ipv6-toolkit x x Stress Testing
mdk3 x x Stress Testing
Reaver x x Stress Testing
rtpflood x x Stress Testing
SlowHTTPTest x x Stress Testing
t50 x x Stress Testing
Termineter x x Stress Testing
THC-IPV6 x x Stress Testing
THC-SSL-DOS x x Stress Testing

Vulnerability Analysis

If you want to perform Vulnerability Analysis then make sure that you are familiar with the analysis tools below.

Name Free Trial Paid Windows Linux macOS Genre
BBQSQL x x Vulnerability Analysis
BED x x Vulnerability Analysis
cisco-auditing-tool x x Vulnerability Analysis
cisco-global-exploiter x x Vulnerability Analysis
cisco-ocs x x Vulnerability Analysis
cisco-torch x x Vulnerability Analysis
copy-router-config x x Vulnerability Analysis
DBPwAudit x x Vulnerability Analysis
Doona x x Vulnerability Analysis
DotDotPwn x x Vulnerability Analysis
HexorBase x x Vulnerability Analysis
Inguma x x Vulnerability Analysis
jSQL x x Vulnerability Analysis
Lynis x x Vulnerability Analysis
Nmap x x Vulnerability Analysis
ohrwurm x x Vulnerability Analysis
openvas x x Vulnerability Analysis
Oscanner x x Vulnerability Analysis
Powerfuzzer x x Vulnerability Analysis
sfuzz x x Vulnerability Analysis
SidGuesser x x Vulnerability Analysis
SIPArmyKnife x x Vulnerability Analysis
sqlmap x x Vulnerability Analysis
Sqlninja x x Vulnerability Analysis
sqlsus x x Vulnerability Analysis
THC-IPV6 x x Vulnerability Analysis
tnscmd10g x x Vulnerability Analysis
unix-privesc-check x x Vulnerability Analysis
Yersinia x x Vulnerability Analysis

Wireless

Do you own a WIFI router, or do you manage them? Then it is strongly recommended to test the security of those accesspoints. To do so, you can use the tools that you can find below. Each tool below will help you to improve the security status of your accesspoints.

Name Free Trial Paid Windows Linux macOS Genre
Airbase-ng x x Wireless Attacks
Aircrack-ng x x Wireless Attacks
Airdecap-ng and Airdecloak-ng x x Wireless Attacks
Aireplay-ng x x Wireless Attacks
Airmon-ng x x Wireless Attacks
Airodump-ng x x Wireless Attacks
airodump-ng-oui-update x x Wireless Attacks
Airolib-ng x x Wireless Attacks
Airserv-ng x x Wireless Attacks
Airtun-ng x x Wireless Attacks
Asleap x x Wireless Attacks
Besside-ng x x Wireless Attacks
Bluelog x x Wireless Attacks
BlueMaho x x Wireless Attacks
Bluepot x x Wireless Attacks
BlueRanger x x Wireless Attacks
Bluesnarfer x x Wireless Attacks
Bully x x Wireless Attacks
coWPAtty x x Wireless Attacks
crackle x x Wireless Attacks
eapmd5pass x x Wireless Attacks
Easside-ng x x Wireless Attacks
Fern Wifi Cracker x x Wireless Attacks
FreeRADIUS-WPE x x Wireless Attacks
Ghost Phisher x x Wireless Attacks
GISKismet x x Wireless Attacks
Gqrx x x Wireless Attacks
gr-scan x x Wireless Attacks
hostapd-wpe x x Wireless Attacks
ivstools x x Wireless Attacks
kalibrate-rtl x x Wireless Attacks
KillerBee x x Wireless Attacks
Kismet x x Wireless Attacks
makeivs-ng x x Wireless Attacks
mdk3 x x Wireless Attacks
mfcuk x x Wireless Attacks
mfoc x x Wireless Attacks
mfterm x x Wireless Attacks
Multimon-NG x x Wireless Attacks
Packetforge-ng x x Wireless Attacks
PixieWPS x x Wireless Attacks
Pyrit x x Wireless Attacks
Reaver x x Wireless Attacks
redfang x x Wireless Attacks
RTLSDR Scanner x x Wireless Attacks
Spooftooph x x Wireless Attacks
Tkiptun-ng x x Wireless Attacks
Wesside-ng x x Wireless Attacks
Wifi Honey x x Wireless Attacks
wifiphisher x x Wireless Attacks
Wifitap x x Wireless Attacks
Wifite x x Wireless Attacks
wpaclean x x Wireless Attacks

Afterword

Did you enjoy this listing? then do not hesitate to share it with your friends! If you miss some tools, then do let us know, we will make sure that they get listed. It works the best if you leave the official site of the tool you recommend.

Recommended For You

About the Author: CWZ

Founder of Cyberwarzone.com.