Cyber
1. Penetration Testing and Vulnerability Scanning
- Nmap – Network scanning and security auditing tool.
- Metasploit – Framework for developing, testing, and executing exploit code.
- Nessus – Vulnerability assessment tool for discovering security issues.
- Burp Suite – Web application security testing tool.
2. Network Security and Monitoring
- Wireshark – Network protocol analyzer for troubleshooting and analysis.
- Zeek – Network security monitoring tool for analyzing traffic.
- Snort – Open-source intrusion detection and prevention system (IDS/IPS).
3. Password Cracking and Authentication Testing
- John the Ripper – Password cracking tool for weak password testing.
- Hashcat – Advanced password recovery and cracking tool.
- Hydra – Parallelized login cracker for network services.
4. Digital Forensics and Incident Response (DFIR)
- Autopsy – Digital forensics platform and GUI for The Sleuth Kit.
- Volatility – Memory forensics tool for analyzing volatile memory (RAM).
- FTK Imager – Forensic imaging tool for evidence acquisition.
5. Malware Analysis
- Ghidra – Open-source reverse engineering tool developed by NSA.
- Cuckoo Sandbox – Automated malware analysis system.
- Radare2 – Open-source framework for reverse engineering.
6. OSINT (Open-Source Intelligence)
- Maltego – Graphical link analysis tool for OSINT investigations.
- SpiderFoot – Automated OSINT collection and analysis tool.
- theHarvester – Email, subdomain, and domain name reconnaissance tool.
7. Encryption and Privacy
- VeraCrypt – Open-source disk encryption software.
- GnuPG (GPG) – Open-source implementation of PGP for secure communication.
- Tor Browser – Anonymity-focused browser using the Tor network.
8. Threat Intelligence
- MISP – Open-source threat intelligence platform (TIP).
- Cortex – Automated analysis engine for threat intel and indicators.
- AlienVault OTX – Threat sharing and intelligence platform.
9. Web Application Security
- OWASP ZAP – Web application security scanner and testing tool.
- SQLmap – Automated SQL injection and database takeover tool.
- Dirbuster – Directory brute-forcing tool for uncovering hidden directories.
10. Cloud Security
- ScoutSuite – Multi-cloud security auditing tool.
- Prowler – AWS security best practices assessment tool.
- CloudSploit – Security configuration monitoring for cloud platforms.
Leave a Reply