Cyber security tools lists often contain the same tools, and we are aware of that. It is for that reason, that we have decided to provide to you the most listed cyber security tools, and the best sources on where to get your cyber security tools.
We have listed down
- Social Engineering tools
- Reporting tools
- Password security tools
- Network sniffing tools
- Forensic tools
- Stress testing tools
- Auditing tools
- WiFi security tools
Best cyber security tools
The list below contains the best cyber security tools which you often find back in other cyber security listings.
Name | Type |
Metasploit | Network scanner |
Nmap | Network scanner |
Wireshark | Analysis tool |
Aircrack-ng | Network security tool |
John the ripper | Password cracker |
Nessus | Network scanner |
Burpsuite | Network scanner |
MSFVenom | Malware creation kit |
Fiddler | Sniffing tool |
Cain and Abel | Recovery tool |
Sources where to get good cyber security tools
We mentioned it before, it is almost impossible to keep track of all of the cyber security tools that are being published, but by having a list, of cyber security tools providers, it should become a bit easier to find the latest cyber security tools.
In the 1000+ cyber security tools post, we shared how to find those sources, and we have listed down 1000 cyber security tools that might be of direct value for you.
Social Engineering toolkits
Social engineering is the abuse of human traits such as curiosity, confidence, greed, fear and ignorance. Social engineering is as old as humanity and takes many forms.
Criminals try to obtain confidential information from you. They try to get you to perform a certain action, such as giving out personal data (phishing), security codes or credit card details or installing malware. The listed social engineering tools below, can help you to assess the social engineering awareness and security.
Social Engineer Toolkit (SET) |
King Phisher |
Evilginx |
Evilginx2 |
wifiphisher |
Catphish |
Beelogger |
FiercePhish |
SocialFish |
ShellPhish |
Gophish |
phishery |
ReelPhish |
Modlishka |
Cyber security reporting tools
CaseFile |
cherrytree |
CutyCapt |
dos2unix |
Dradis |
MagicTree |
Metagoofil |
Nipper-ng |
pipal |
RDPY |
Password security tools
The most common password is 123456. Every hacker knows that. Therefore, it is the least sensible password to use. The password security tools which have been listed below, will assist you in auditing the passwords and the password policies which have been set.
BruteSpray |
Burp Suite |
CeWL |
chntpw |
cisco-auditing-tool |
CmosPwd |
creddump |
crowbar |
crunch |
findmyhash |
gpp-decrypt |
hash-identifier |
Hashcat |
HexorBase |
THC-Hydra |
John the Ripper |
Johnny |
keimpx |
Maltego Teeth |
Maskprocessor |
multiforcer |
Ncrack |
oclgausscrack |
ophcrack |
PACK |
patator |
phrasendrescher |
polenum |
RainbowCrack |
rcracki-mt |
RSMangler |
SecLists |
SQLdict |
Statsprocessor |
THC-pptp-bruter |
TrueCrack |
WebScarab |
wordlists |
zaproxy |
Sniffing tools
bettercap |
Burp Suite |
DNSChef |
fiked |
hamster-sidejack |
HexInject |
iaxflood |
inviteflood |
iSMTP |
isr-evilgrade |
mitmproxy |
ohrwurm |
protos-sip |
rebind |
responder |
rtpbreak |
rtpinsertsound |
rtpmixsound |
sctpscan |
SIPArmyKnife |
SIPp |
SIPVicious |
SniffJoke |
SSLsplit |
sslstrip |
THC-IPV6 |
VoIPHopper |
WebScarab |
Wifi Honey |
Wireshark |
xspy |
Yersinia |
zaproxy |
Cyber Security forensics
Binwalk |
bulk-extractor |
Capstone |
chntpw |
Cuckoo |
dc3dd |
ddrescue |
DFF |
diStorm3 |
Dumpzilla |
extundelete |
Foremost |
Galleta |
Guymager |
iPhone Backup Analyzer |
p0f |
pdf-parser |
pdfid |
pdgmail |
peepdf |
RegRipper |
Volatility |
Xplico |
Cyber Security stress testing tools
DHCPig |
FunkLoad |
iaxflood |
Inundator |
inviteflood |
ipv6-toolkit |
mdk3 |
Reaver |
rtpflood |
SlowHTTPTest |
t50 |
Termineter |
THC-IPV6 |
THC-SSL-DOS |
Cyber security auditing tools
Armitage |
Backdoor Factory |
BeEF |
cisco-auditing-tool |
cisco-global-exploiter |
cisco-ocs |
cisco-torch |
Commix |
crackle |
exploitdb |
jboss-autopwn |
Linux Exploit Suggester |
Maltego Teeth |
Metasploit Framework |
MSFPC |
RouterSploit |
SET |
ShellNoob |
sqlmap |
THC-IPV6 |
Yersinia |
Wireless security tools
You have installed a wireless network at home, have you secured it? You can use WiFi to send all your network traffic over the air wirelessly, without security this is a big problem. The WiFi security tools which are listed below, will assist you in getting a good view on what is happening via the wireless networks. They also allow you to audit the WiFi networks, so you can find cyber security issues.
Airbase-ng |
Aircrack-ng |
Airdecap-ng and Airdecloak-ng |
Aireplay-ng |
airgraph-ng |
Airmon-ng |
Airodump-ng |
airodump-ng-oui-update |
Airolib-ng |
Airserv-ng |
Airtun-ng |
Asleap |
Besside-ng |
Bluelog |
BlueMaho |
Bluepot |
BlueRanger |
Bluesnarfer |
Bully |
coWPAtty |
crackle |
eapmd5pass |
Easside-ng |
Fern Wifi Cracker |
FreeRADIUS-WPE |
Ghost Phisher |
GISKismet |
Gqrx |
gr-scan |
hostapd-wpe |
ivstools |
kalibrate-rtl |
KillerBee |
Kismet |
makeivs-ng |
mdk3 |
mfcuk |
mfoc |
mfterm |
Multimon-NG |
Packetforge-ng |
PixieWPS |
Pyrit |
Reaver |
redfang |
RTLSDR Scanner |
Spooftooph |
Tkiptun-ng |
Wesside-ng |
Wifi Honey |
wifiphisher |
Wifitap |
Wifite |
wpaclean |
Conclusion
It is recommended to periodically perform cyber security audits to ensure the security of (web-)applications, networks and systems.
For example after a development iteration to check new functionalities for vulnerabilities. An update to the code of your web application or changing web server settings can lead to new vulnerabilities with far-reaching consequences.
Now you can specifically zoom in on the new functionalities and newly developed code/processes by using the tools above. This will safe you time, so you can focus on the manual work.