Cyberthical Glitch LogoCyberthical Glitch LogoCyberthical Glitch Logo

Cybersecurity Tools

A curated directory of essential tools for every cybersecurity professional.

Networking

Networking
Nmap (Network Mapper)

The industry-standard tool for network discovery, security auditing, and port scanning.

Networking
Naabu

A fast port scanner based on the Go language, focusing on speed and reliability for initial network discovery.

Networking
Wireshark

The world's foremost network protocol analyzer and traffic sniffing tool.

Networking
Tcpdump

A powerful command-line packet analyzer for capturing and displaying network traffic.

Networking
Aircrack-ng

A suite of tools dedicated to assessing the security of Wi-Fi networks.

Networking
Netcat

Networking utility for port scanning and reverse shells.

Networking
Masscan

Fastest internet-wide port scanner.

Web Security

Web Security
Burp Suite

The leading platform for security testing and hacking web applications.

Web Security
SQLmap

An automatic tool for detecting and exploiting SQL injection flaws in web applications.

Web Security
Gobuster

A fast command-line tool for bruteforcing directories, files, and DNS subdomains on web servers.

Web Security
Nikto

A simple, open-source web server scanner that checks for dangerous files/CGIs.

Web Security
FFUF

Fast web fuzzer for directory and endpoint discovery.

Web Security
Wfuzz

Web application fuzzer for brute forcing parameters.

Web Security
WPScan

WordPress vulnerability scanner.

Web Security
XSStrike

Advanced XSS vulnerability detection tool.

Web Security
OWASP ZAP

Automated web application security scanner.

Web Security
Dirsearch

Directory and file brute-force tool.

Pentesting

Pentesting
Metasploit Framework

The world’s most used penetration testing framework, for developing and executing exploit code.

Pentesting
John the Ripper (JtR)

A fast and popular open-source password cracking utility.

Pentesting
Hashcat

The world's fastest password recovery utility, known for its GPU-accelerated cracking.

Pentesting
THC Hydra

A parallelized login cracker that supports over 50 network protocols.

Pentesting
Enum4linux

Windows SMB enumeration tool.

Pentesting
SMBMap

Tool for enumerating SMB shares.

Pentesting
CrackMapExec

Pentesting tool for Active Directory networks.

Pentesting
Impacket

Collection of Python tools for network protocols.

Pentesting
Responder

LLMNR, NBT-NS, and MDNS poisoning tool.

OSINT

OSINT
SubFinder

A fast passive subdomain enumeration tool that uses multiple sources (APIs, search engines) for discovery.

OSINT
Assetfinder

A passive reconnaissance tool that finds domain assets (subdomains) from various external data sources.

OSINT
theHarvester

A simple, yet effective tool for gathering open-source intelligence (OSINT).

OSINT
Sherlock

A tool to hunt for social media accounts by username across hundreds of networks.

OSINT
Amass

Subdomain enumeration & attack surface mapping tool.

OSINT
WhatWeb

Website fingerprinting tool.

OSINT
FOCA

Metadata extraction tool.

OSINT
Recon-ng

Full OSINT framework for information gathering.

Forensics

Forensics
Autopsy

A user-friendly, open-source digital forensics platform and graphical interface to The Sleuth Kit.

Forensics
Volatility Framework

The premier open-source memory forensics framework for analyzing RAM dumps.

Forensics
FTK Imager

Forensic tool for imaging disks & analyzing data.

Reverse Engineering

Reverse Engineering
Ghidra

A free, open-source software reverse engineering (SRE) framework developed by the NSA.

Reverse Engineering
Binwalk

A fast tool for analyzing, reverse engineering, and extracting firmware images.

Reverse Engineering
Radare2

Reverse engineering and binary analysis framework.

Reverse Engineering
Apktool

Reverse engineer Android APK files.

Defense

Defense
Snort

A leading open-source network intrusion detection and prevention system (IDS/IPS).

Defense
ClamAV

An open-source antivirus engine for detecting trojans, viruses, and other malware.

Defense
Lynis

A comprehensive security auditing and hardening tool for Unix-like operating systems.

Encryption

Encryption
VeraCrypt

Free open-source disk encryption software for creating secure, encrypted volumes.

Want to see more?

The world of cybersecurity tools is vast. Explore the comprehensive list on the official Kali Linux website.

Explore All Kali Tools