Cyber Security Tools Directory

    The most comprehensive directory of cybersecurity tools for security assessment, penetration testing, and risk discovery.

    Explore our curated collection of 137+ essential cybersecurity tools, ranging from network security and penetration testing to malware analysis and vulnerability assessment.

    Whether you're a security professional, penetration tester, or IT administrator, find the right tools to enhance your security operations, conduct thorough assessments, and protect your digital assets.

    Categories

    Tags

    Waybackurls

    Fetch URLs from Wayback Machine.

    web-archivereconnaissance

    Sublist3r

    Fast subdomains enumeration tool for penetration testers

    subdomain enumerationdomain discoveryreconnaissance

    Snort

    Open source intrusion prevention system capable of real-time traffic analysis and packet logging

    network securityintrusion detectionintrusion prevention

    Snov.io Email Finder

    Professional email finder and verifier tool. Find anyone's email address and verify them in bulk. Features include email finder, domain search, and email verification.

    email-finderosintverification

    WAFW00F

    Web Application Firewall (WAF) fingerprinting tool to identify and detect web application firewall products

    WAF detectionreconnaissanceautomation

    Wireshark

    Network protocol analyzer for network troubleshooting and analysis

    packet analyzernetworktraffic analysis

    WPScan

    WordPress vulnerability scanner used to identify security issues in WordPress installations

    WordPressvulnerability scanningenumeration

    Veracode

    Application security testing platform

    SASTDASTcode analysis

    MobSF

    A comprehensive mobile security testing framework offering static and dynamic analysis, API security testing, and malware analysis.

    mobile-securitystatic-analysisdynamic-analysismalware

    Sensity

    Enterprise platform for detecting deepfakes and synthetic media across video content.

    Video DetectionAI DetectionEnterprise

    Recon-ng

    Full-featured web reconnaissance framework written in Python

    frameworkreconnaissancedata collection

    Zeek (Bro)

    Powerful network analysis framework that transforms network traffic into high-level events and entities

    network monitoringtraffic analysisintrusion detection

    Wapiti

    Web application vulnerability scanner.

    web-scannervulnerability-scanner

    Netcat

    Swiss army knife for TCP/IP connections and listening

    network explorationdata transferdebugging

    RedTiger-Tools

    Collection of cybersecurity tools for red team operations.

    red-teampenetration-testingtools

    SpiderFoot

    Open source intelligence (OSINT) automation tool that integrates with multiple data sources

    automated recondata gatheringenumeration

    Wfuzz

    Web application fuzzer.

    fuzzingweb-security

    Wazuh

    Open source security monitoring solution

    SIEMEDRthreat detection

    Nuclei

    Fast and customizable vulnerability scanner

    vulnerability scannertemplate-basedautomation

    Nmap

    Network security scanner for discovery and security auditing

    networkscannerreconnaissance

    OhMyQR

    QR code phishing generator tool.

    qr-codephishingsocial-engineering

    OWASP ZAP

    Open-source web application security scanner

    web securityscannerOWASP

    Rapid7 InsightVM

    Enterprise vulnerability management and assessment platform

    asset discoveryscanningcompliance

    Strings

    Binary analysis utility.

    binary-analysisforensics

    Kismet

    Wireless network and device detector, sniffer, wardriving tool, and WIDS framework

    wi-fi analysissniffingintrusion detection

    XSStrike

    Advanced XSS detection suite.

    xssweb-security

    Shodan

    Search engine for Internet-connected devices

    IoTreconnaissancedevice discovery

    Sigma

    A generic SIEM rules platform with multi-platform support and community-driven rules for easy conversion between formats.

    siemthreat-detectionsecurity-rulesmonitoring

    Nessus

    Vulnerability scanner for comprehensive security assessments

    vulnerability scannerassessmentcompliance

    Sn1per

    Automated pentest recon scanner.

    automationreconnaissance

    SocialFish

    Educational phishing tool with multiple templates.

    phishingeducationtemplates

    JWT_tool

    JSON Web Token testing tool.

    jwttesting

    Amass

    Network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.

    reconnaissanceenumerationnetwork-mapping

    THC Amap

    Advanced service identification and port scanning tool

    service identificationport scanningreconnaissance

    ExifTool

    Read, write and edit metadata in files.

    metadatafile-analysis

    Cuckoo

    Automated malware analysis system

    malwaresandboxanalysis

    AI Voice Detector

    Specialized tool for detecting AI-generated and synthetic voice content.

    Audio DetectionAI DetectionVoice Analysis

    Cobalt Strike

    Adversary simulation and red team operations

    red teampenetration testingC2

    Content Authenticity Initiative Tools

    Comprehensive digital content verification platform providing content provenance tracking, digital signatures, metadata verification, and chain of custody tracking.

    content-verificationdigital-signatureprovenance-trackingmetadata-verification

    Caido

    Lightweight web security auditing toolkit.

    web-proxysecurity-testing

    Anchore

    Container security and compliance platform

    container scanningcompliancevulnerability analysis

    ClamAV

    Open source antivirus engine for detecting trojans, viruses, malware & other malicious threats

    malware scanningantivirusopen source

    DeepFake Detector

    Tool for detecting and analyzing potential deepfake videos using advanced AI algorithms.

    Video DetectionAI DetectionVideo Analysis

    AuthentiCheck

    Comprehensive content verification platform offering cross-modal analysis, AI detection algorithms, blockchain verification, and detailed audit trails.

    content-verificationcross-modal-analysisblockchain-verificationaudit-trail

    Caldera

    Automated adversary emulation system that performs post-compromise adversarial behavior

    red teamautomationsimulation

    CoWPAtty

    Wireless WPA/WPA2-PSK handshake cracking tool

    WPA crackingbrute forcepassword attack

    DeepTrace

    Advanced deepfake detection platform featuring video analysis, face manipulation detection, movement analysis, and confidence scoring capabilities.

    deepfake-detectionvideo-analysisface-detectionai-detection

    Audio Verifier Pro

    Professional audio authentication software featuring waveform analysis, digital signature verification, tampering detection, and comprehensive metadata analysis.

    audio-authenticationwaveform-analysistampering-detectionmetadata-analysis

    IoTSeeker

    An IoT security assessment tool for default credential testing, device discovery, and vulnerability scanning.

    iot-securitycredential-testingvulnerability-scanningdevice-discovery

    BeeF

    Browser Exploitation Framework for penetration testing

    browser exploitationclient-side attackshooking

    Cerebro

    Open source threat intelligence aggregation platform

    intelligence aggregatordata correlationautomation

    Deepware Scanner

    Advanced deepfake video detection platform that helps identify AI-generated video content.

    Video DetectionAI DetectionVideo Analysis

    Censys

    Search engine for Internet devices and networks.

    search-enginereconnaissance

    DeepBlueCLI

    A PowerShell-based Windows security tool for event log analysis, threat hunting automation, and IOC detection.

    windows-securitythreat-huntingpowershelllog-analysis

    Fake Image Detector

    Tool for identifying and analyzing potentially AI-generated or manipulated images.

    Image DetectionAI DetectionImage Analysis

    Empire

    Post-exploitation framework that enables you to run PowerShell agents without powershell.exe

    C2obfuscationPowerShell

    Burp Suite

    Integrated platform for web application security testing

    web securitypenetration testingproxy

    Zphisher

    Automated phishing tool with multiple templates.

    phishingautomationtemplates

    DefectDojo

    A DevSecOps platform for security orchestration, vulnerability management, metrics reporting, and CI/CD integration.

    devsecopsvulnerability-managementsecurity-orchestrationcicd

    CloudSploit

    Cloud security configuration monitoring

    cloudAWSAzure

    Arachni

    Feature-full, modular, high-performance Ruby framework aimed towards web application security scanning

    web application scannerdynamic analysisdetection

    Hashcat

    World's fastest and most advanced password recovery tool

    brute forcecryptographyGPU acceleration

    Dependency-Track

    A Software Composition Analysis platform for software bill of materials (SBOM), component vulnerability analysis, and license compliance.

    scasbomvulnerability-analysiscompliance

    Evilginx

    Man-in-the-middle attack framework used for phishing credentials and session cookies.

    phishingmitmcredentials

    Blackbird

    An OSINT tool to search for accounts by username in 581 sites. Features include asynchronous execution, highly customizable, and CSV/TXT export.

    osintreconnaissanceusername-search

    Binwalk

    Firmware analysis tool.

    firmware-analysisreverse-engineering

    ElevenLabs Speech Classifier

    AI speech detection tool to identify synthetic and AI-generated audio content.

    Audio DetectionAI DetectionSpeech Analysis

    BlackPhish

    Modern phishing tool with advanced functionality.

    phishingsecurity-testingsocial-engineering

    BloodHound

    Active Directory security tool that uses graph theory to reveal hidden relationships and attack paths

    enumerationlateral movementgraph analysis

    Aircrack-ng

    Complete suite for wireless network security assessment

    wirelessWEPWPA

    Dirsearch

    Advanced command-line tool designed to brute force directories and files in webservers

    directory brute forcescanningenumeration

    BugBountyHunter

    Bug bounty hunting platform and methodology.

    bug-bountymethodology

    AI or Not

    Multi-modal AI detection platform for identifying synthetic images and audio.

    Image DetectionAudio DetectionAI Detection

    IntelOwl

    Intelligence Framework for analyzing threats in multiple ways from a single API.

    threat-intelligenceanalysisapi

    Ghost Phisher

    Wireless and ethernet security auditing and attack software.

    phishingwireless-securityethernet-security

    BreachSense

    Platform for monitoring threat actor channels and data breaches.

    threat-monitoringbreach-detectionintelligence

    Exif Purge

    Advanced image metadata analysis tool providing metadata extraction, digital signature verification, image source identification, and manipulation detection features.

    image-authenticationmetadata-analysisdigital-signaturesource-identification

    GPTZero

    Advanced AI text detection tool offering writing style analysis, perplexity scoring, and bulk content scanning capabilities for identifying AI-generated content.

    ai-detectiontext-analysiscontent-scanning

    Illuminarty

    AI image detection and analysis platform for identifying synthetic content.

    Image DetectionAI DetectionContent Analysis

    Deepfence ThreatMapper

    Open source cloud native security observability platform

    cloudcontainervulnerability scanning

    Acusense

    Sophisticated audio forensics tool for voice pattern analysis, audio manipulation detection, spectral analysis, and audio source identification.

    audio-forensicsvoice-analysisspectral-analysissource-identification

    Ghidra

    Software reverse engineering framework by NSA

    reverse engineeringdecompileranalysis

    Assetfinder

    Find domains and subdomains related to a given domain.

    asset-discoveryreconnaissance

    GitTools

    Repository investigation tools.

    gitforensics

    APISec

    An automated API security testing platform offering continuous API scanning, zero-day vulnerability detection, and API documentation analysis.

    api-securityvulnerability-scanningautomationtesting

    Docker Bench Security

    Security assessment of Docker containers

    dockercontainersecurity assessment

    GHunt

    An offensive Google framework focused on OSINT gathering and vulnerability research around Google services and products. Latest v2.0.1 release includes major improvements.

    osintgooglereconnaissance

    Bandit

    Security tool designed to find common security issues in Python code

    static analysisPython securitycode scanning

    GoPhish

    Open-source phishing toolkit designed for businesses and penetration testers.

    phishingpenetration-testingtoolkit

    Snyk

    Developer security platform for open source and container security

    open-source scanningcontainer securitycode analysis

    Sysdig Secure

    Container and cloud security platform with runtime protection

    runtime securitycontainerthreat detection

    Metasploit

    Penetration testing framework that makes hacking simple

    exploitationpenetration testingframework

    Trivy

    A comprehensive vulnerability scanner for containers, filesystems, and git repositories, offering fast and accurate scanning with DevOps-friendly integration.

    container-securityvulnerability-scannerdevopssecurity

    Nikto

    Open source web server scanner that performs comprehensive tests against web servers for multiple items

    vulnerability scannerweb securityreconnaissance

    Oversecured

    An advanced mobile security scanner for Android vulnerability scanning, runtime analysis, and SDK security testing.

    android-securityvulnerability-scannerruntime-analysissdk-security

    Patator

    Multi-purpose brute-forcer.

    brute-forceauthentication-testing

    Yersinia

    Framework for performing layer 2 attacks, focused on network protocol analysis

    layer 2 analysisSTPVLAN

    YARA

    Pattern matching swiss knife for malware researchers and threat hunters

    threat intelligencepattern matchingmalware

    OpenVAS

    Open source vulnerability assessment scanner

    vulnerability scanningdetectionreporting

    TheHive

    Scalable security incident response platform

    incident responsethreat intelligenceSIEM

    SQLmap

    Automatic SQL injection tool.

    sql-injectionexploitation

    Lynis

    Security auditing tool for Linux/Unix-based systems that performs detailed security scans and compliance checks

    linux securityauditingcompliance

    Suricata

    Open source network threat detection engine capable of real-time intrusion detection, inline intrusion prevention and network security monitoring

    network securityintrusion detectionintrusion prevention

    Dradis

    Collaborative platform for InfoSec teams to handle reporting and vulnerability management

    pentest collaborationreportingvulnerability management

    Checkov

    An Infrastructure as Code security scanner that scans Terraform, CloudFormation, and Kubernetes manifests with 1000+ built-in policies and custom policy framework support.

    iacterraformcloudformationkubernetes

    Hping3

    Network tool able to send custom TCP/IP packets and display target replies

    packet craftingfirewall testingTCP/IP analysis

    Content at Scale Detector

    AI image detection tool specifically designed for identifying AI-generated images.

    Image DetectionAI DetectionContent Analysis

    Fwknop

    Single Packet Authorization and Port Knocking

    port knockingfirewallaccess control

    Hydra

    Fast and flexible network logon cracker which supports numerous protocols

    brute forcepassword crackingauthentication

    Dracon

    A modern API security scanner supporting GraphQL and REST API testing, authentication testing, rate limiting analysis, and API fuzzing capabilities.

    api-securitygraphqlrest-apifuzzing

    Gobuster

    Directory/file, DNS and VHost busting tool written in Go

    directory enumerationbrute forceDNS

    OpenCTI

    Open Cyber Threat Intelligence Platform that allows organizations to manage their cyber threat intelligence knowledge and observables.

    threat-intelligenceopen-sourceplatform

    I-See-You

    Tool for finding Geolocation of devices using social engineering.

    geolocationsocial-engineeringtracking

    HELK

    Hunting ELK with advanced analytics capabilities

    elastic stackreal-time analysisthreat detection

    WiFiPhisher

    Security tool that mounts automated victim-customized phishing attacks against WiFi clients.

    wifiphishingwireless-security

    Forensically

    A comprehensive digital image forensics tool offering error level analysis, noise analysis, clone detection, and metadata analysis capabilities for detecting manipulated images and verifying image authenticity.

    image-forensicsmetadata-analysisclone-detectionnoise-analysis

    John the Ripper

    Advanced password cracker

    password crackingcryptographybrute force

    King Phisher

    Tool for testing and promoting user awareness by simulating real-world phishing attacks.

    phishingawareness-trainingsimulation

    Maltego

    Interactive data mining tool for link analysis

    OSINTreconnaissancelink analysis

    PowerSploit

    Collection of PowerShell modules used during penetration tests and red team engagements

    PowerShellexploitationpentesting

    Falco

    A cloud-native runtime security tool providing real-time container security monitoring, Kubernetes threat detection, and custom rule engine for behavior detection.

    container-securitykubernetesruntime-securitymonitoring

    OSSEC

    Open source Host-based Intrusion Detection System (HIDS) that performs log analysis, integrity checking, rootkit detection, and more

    host-based intrusion detectionlog analysissecurity monitoring

    Velociraptor

    Endpoint visibility and collection tool

    incident responseforensicsendpoint monitoring

    Social Engineer Toolkit

    Open-source penetration testing framework designed for social engineering.

    social-engineeringpenetration-testingframework

    MISP

    Open Source Threat Intelligence Platform

    threat intelligenceinformation sharingIOC

    SQLMap

    Open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws

    SQL injectiondatabaseexploitation

    Qualys

    Cloud-based IT, security and compliance solutions

    cloud securitycompliancevulnerability scanning

    Splunk

    Platform for searching, monitoring, and analyzing machine-generated big data via a web-style interface

    log analysisthreat detectionsecurity monitoring

    MediaReview

    Multi-modal content analysis platform utilizing machine learning for detecting AI-generated or manipulated media, featuring forensic analysis tools and automated reporting.

    media-analysismachine-learningforensic-analysisautomated-reporting

    Phishing Frenzy

    Open source phishing framework for penetration testers and security researchers.

    phishingpenetration-testingsecurity-testing

    Keycloak

    Open source Identity and Access Management

    IAMauthenticationauthorization

    Masscan

    Mass IP port scanner.

    port-scannernetwork-scanning

    FalconFeeds

    Threat intelligence feed aggregator and analyzer.

    threat-feedsintelligencemonitoring

    SayCheese

    Tool for grabbing target webcam shots by link.

    webcamsocial-engineeringsurveillance

    Nuanced

    Advanced AI-generated content detection platform with trial access.

    Image DetectionAI DetectionContent Analysis

    Volatility

    Advanced memory forensics framework

    memory analysisforensicsincident response

    Hive Moderation

    Comprehensive AI-generated content detection platform for video, audio, and images.

    Video DetectionAudio DetectionImage DetectionContent Moderation

    Essential Cybersecurity Tools