Network discovery and security auditing tool. The industry standard for port scanning and network mapping.
Network scanning, port discovery, OS detection
Fastest port scanner on the internet. Can scan the entire internet in under 6 minutes.
Search engine for internet-connected devices. Find vulnerable systems worldwide.
Internet-wide scanning platform providing visibility into devices and networks across the internet.
Full-featured reconnaissance framework with independent modules and database interaction.
OSINT gathering, domain recon, contact harvesting
In-depth attack surface mapping and asset discovery using open source information gathering.
Subdomain enumeration, DNS mapping, asset discovery
The #1 web application security testing tool. Essential for finding web vulnerabilities.
Web app pentesting, API testing, vulnerability scanning
Free alternative to Burp Suite. Great for automated scanning and manual testing.
Web vulnerability scanning, API testing
Web server scanner that tests for dangerous files, outdated software, and misconfigurations.
Web server vulnerability scanning
Automatic SQL injection and database takeover tool. Supports virtually all database engines.
SQL injection detection and exploitation
Fast web fuzzer written in Go. Excellent for directory/vhost/parameter discovery.
Directory brute-forcing, parameter fuzzing, vhost discovery
Fast and customizable vulnerability scanner based on YAML templates with 7000+ community templates.
Automated vulnerability scanning, CVE detection, misconfiguration checks
WordPress security scanner. Detects vulnerable plugins, themes, and misconfigurations.
WordPress vulnerability scanning, plugin enumeration
Directory/file, DNS, and vhost busting tool written in Go. Extremely fast.
Directory enumeration, DNS subdomain brute-forcing
The world's most used penetration testing framework. Contains thousands of exploits.
Exploitation, post-exploitation, payload generation
Commercial adversary simulation and red team operations platform.
Open source cross-platform adversary emulation/red team framework by BishopFox.
C2 framework, implant generation, red team ops
Post-exploitation and adversary emulation framework using PowerShell and Python agents.
Post-exploitation, lateral movement, persistence
Browser Exploitation Framework. Focuses on client-side attack vectors via web browsers.
Browser exploitation, XSS attacks, client-side testing
The world's foremost network protocol analyzer. Essential for network troubleshooting.
Packet analysis, network forensics, protocol debugging
Command-line packet analyzer. Lightweight alternative to Wireshark.
LLMNR, NBT-NS and MDNS poisoner. Captures NTLMv1/v2 hashes on the network.
Swiss Army knife for WiFi, Bluetooth, and network reconnaissance and MITM attacks.
MITM attacks, network recon, WiFi hacking
Network forensic analysis tool for detecting OS, sessions, hostnames, and open ports.
Network forensics, PCAP analysis, host identification
World's fastest password cracker. Supports 300+ hash types with GPU acceleration.
Password recovery, hash cracking
Fast password cracker with support for many hash and cipher types.
Password auditing, hash cracking
Fast network logon cracker supporting numerous protocols including SSH, FTP, HTTP, and more.
Online password cracking, brute force attacks
Custom wordlist generator that spiders a target website to create targeted password lists.
Custom wordlist generation, targeted password attacks
Industry-leading vulnerability scanner with comprehensive coverage for network and web flaws.
Vulnerability assessment, compliance auditing, patch management
Full-featured open-source vulnerability scanner. Free alternative to Nessus.
Network vulnerability scanning, compliance checks
Comprehensive security scanner for containers, filesystems, git repos, and Kubernetes.
Container scanning, IaC scanning, SBOM generation
Complete suite for assessing WiFi network security. Supports WEP and WPA/WPA2 cracking.
WiFi cracking, packet capture, deauthentication
Automated wireless attack tool. Simplifies WiFi auditing with automated workflows.
Wireless network and device detector, sniffer, wardriving tool, and WIDS framework.
Wireless network detection, wardriving, IDS
Visual link analysis tool for OSINT and forensics. Maps relationships between data points.
OSINT analysis, threat intelligence, link analysis
Gathers emails, subdomains, hosts, employee names, and open ports from public sources.
Email harvesting, subdomain enumeration, OSINT
Automated OSINT collection tool with 200+ data source modules for reconnaissance.
Automated OSINT, threat intelligence, footprinting
Hunt down social media accounts by username across 400+ social networks.
Username OSINT, social media profiling
Digital forensics platform with GUI for analyzing hard drives and smartphones.
Disk forensics, file recovery, timeline analysis
Advanced memory forensics framework for extracting artifacts from memory dumps.
Memory forensics, malware analysis, incident response
Pattern matching tool for malware researchers to identify and classify malware samples.
Malware identification, threat hunting, IOC detection
Endpoint visibility and collection tool for digital forensic and incident response.
Endpoint monitoring, artifact collection, threat hunting
NSA's open-source software reverse engineering framework with powerful decompiler.
Binary analysis, malware reverse engineering, decompilation
Industry-standard interactive disassembler and debugger for reverse engineering.
Disassembly, debugging, malware analysis
Open-source reverse engineering framework with CLI tools for binary analysis.
Binary analysis, exploitation, forensics
Multi-cloud security auditing tool for AWS, Azure, GCP, and more.
Cloud security auditing, misconfiguration detection
AWS & Azure security assessment tool aligned with CIS benchmarks and GDPR/HIPAA.
AWS/Azure security auditing, compliance checks
Cloud security posture management detecting misconfigurations across AWS, Azure, GCP.
Cloud misconfiguration scanning, compliance monitoring
Check out our cheat sheets, learning paths, and security writeups for hands-on guides.