Cyber

1. Penetration Testing and Vulnerability Scanning

  • Nmap – Network scanning and security auditing tool.
  • Metasploit – Framework for developing, testing, and executing exploit code.
  • Nessus – Vulnerability assessment tool for discovering security issues.
  • Burp Suite – Web application security testing tool.

2. Network Security and Monitoring

  • Wireshark – Network protocol analyzer for troubleshooting and analysis.
  • Zeek – Network security monitoring tool for analyzing traffic.
  • Snort – Open-source intrusion detection and prevention system (IDS/IPS).

3. Password Cracking and Authentication Testing

  • John the Ripper – Password cracking tool for weak password testing.
  • Hashcat – Advanced password recovery and cracking tool.
  • Hydra – Parallelized login cracker for network services.

4. Digital Forensics and Incident Response (DFIR)

  • Autopsy – Digital forensics platform and GUI for The Sleuth Kit.
  • Volatility – Memory forensics tool for analyzing volatile memory (RAM).
  • FTK Imager – Forensic imaging tool for evidence acquisition.

5. Malware Analysis

  • Ghidra – Open-source reverse engineering tool developed by NSA.
  • Cuckoo Sandbox – Automated malware analysis system.
  • Radare2 – Open-source framework for reverse engineering.

6. OSINT (Open-Source Intelligence)

  • Maltego – Graphical link analysis tool for OSINT investigations.
  • SpiderFoot – Automated OSINT collection and analysis tool.
  • theHarvester – Email, subdomain, and domain name reconnaissance tool.

7. Encryption and Privacy

  • VeraCrypt – Open-source disk encryption software.
  • GnuPG (GPG) – Open-source implementation of PGP for secure communication.
  • Tor Browser – Anonymity-focused browser using the Tor network.

8. Threat Intelligence

  • MISP – Open-source threat intelligence platform (TIP).
  • Cortex – Automated analysis engine for threat intel and indicators.
  • AlienVault OTX – Threat sharing and intelligence platform.

9. Web Application Security

  • OWASP ZAP – Web application security scanner and testing tool.
  • SQLmap – Automated SQL injection and database takeover tool.
  • Dirbuster – Directory brute-forcing tool for uncovering hidden directories.

10. Cloud Security

  • ScoutSuite – Multi-cloud security auditing tool.
  • Prowler – AWS security best practices assessment tool.
  • CloudSploit – Security configuration monitoring for cloud platforms.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *