Comprehensive guide to the best cybersecurity and penetration testing tools. Curated by professionals, tested in real-world scenarios.
Network discovery and security auditing tool. The industry standard for port scanning and network mapping.
Free & Open Source
Network scanning, port discovery, OS detection
Fastest port scanner on the internet. Can scan the entire internet in under 6 minutes.
Search engine for internet-connected devices. Find vulnerable systems worldwide.
Internet-wide scanning platform providing visibility into devices and networks across the internet.
Full-featured reconnaissance framework with independent modules and database interaction.
Free & Open Source
OSINT gathering, domain recon, contact harvesting
In-depth attack surface mapping and asset discovery using open source information gathering.
Free & Open Source
Subdomain enumeration, DNS mapping, asset discovery
The #1 web application security testing tool. Essential for finding web vulnerabilities.
Free & Professional
Web app pentesting, API testing, vulnerability scanning
Free alternative to Burp Suite. Great for automated scanning and manual testing.
Free & Open Source
Web vulnerability scanning, API testing
Web server scanner that tests for dangerous files, outdated software, and misconfigurations.
Free & Open Source
Web server vulnerability scanning
Automatic SQL injection and database takeover tool. Supports virtually all database engines.
Free & Open Source
SQL injection detection and exploitation
Fast web fuzzer written in Go. Excellent for directory/vhost/parameter discovery.
Free & Open Source
Directory brute-forcing, parameter fuzzing, vhost discovery
Fast and customizable vulnerability scanner based on YAML templates with 7000+ community templates.
Free & Open Source
Automated vulnerability scanning, CVE detection, misconfiguration checks
WordPress security scanner. Detects vulnerable plugins, themes, and misconfigurations.
Freemium
WordPress vulnerability scanning, plugin enumeration
Directory/file, DNS, and vhost busting tool written in Go. Extremely fast.
Free & Open Source
Directory enumeration, DNS subdomain brute-forcing
The world's most used penetration testing framework. Contains thousands of exploits.
Free & Professional
Exploitation, post-exploitation, payload generation
Commercial adversary simulation and red team operations platform.
Open source cross-platform adversary emulation/red team framework by BishopFox.
Free & Open Source
C2 framework, implant generation, red team ops
Post-exploitation and adversary emulation framework using PowerShell and Python agents.
Free & Open Source
Post-exploitation, lateral movement, persistence
Browser Exploitation Framework. Focuses on client-side attack vectors via web browsers.
Free & Open Source
Browser exploitation, XSS attacks, client-side testing
The world's foremost network protocol analyzer. Essential for network troubleshooting.
Free & Open Source
Packet analysis, network forensics, protocol debugging
Command-line packet analyzer. Lightweight alternative to Wireshark.
LLMNR, NBT-NS and MDNS poisoner. Captures NTLMv1/v2 hashes on the network.
Swiss Army knife for WiFi, Bluetooth, and network reconnaissance and MITM attacks.
Free & Open Source
MITM attacks, network recon, WiFi hacking
Network forensic analysis tool for detecting OS, sessions, hostnames, and open ports.
Freemium
Network forensics, PCAP analysis, host identification
World's fastest password cracker. Supports 300+ hash types with GPU acceleration.
Free & Open Source
Password recovery, hash cracking
Fast password cracker with support for many hash and cipher types.
Free & Open Source
Password auditing, hash cracking
Fast network logon cracker supporting numerous protocols including SSH, FTP, HTTP, and more.
Free & Open Source
Online password cracking, brute force attacks
Custom wordlist generator that spiders a target website to create targeted password lists.
Free & Open Source
Custom wordlist generation, targeted password attacks
Industry-leading vulnerability scanner with comprehensive coverage for network and web flaws.
Freemium
Vulnerability assessment, compliance auditing, patch management
Full-featured open-source vulnerability scanner. Free alternative to Nessus.
Free & Open Source
Network vulnerability scanning, compliance checks
Comprehensive security scanner for containers, filesystems, git repos, and Kubernetes.
Free & Open Source
Container scanning, IaC scanning, SBOM generation
Complete suite for assessing WiFi network security. Supports WEP and WPA/WPA2 cracking.
Free & Open Source
WiFi cracking, packet capture, deauthentication
Automated wireless attack tool. Simplifies WiFi auditing with automated workflows.
Wireless network and device detector, sniffer, wardriving tool, and WIDS framework.
Free & Open Source
Wireless network detection, wardriving, IDS
Visual link analysis tool for OSINT and forensics. Maps relationships between data points.
Freemium
OSINT analysis, threat intelligence, link analysis
Gathers emails, subdomains, hosts, employee names, and open ports from public sources.
Free & Open Source
Email harvesting, subdomain enumeration, OSINT
Automated OSINT collection tool with 200+ data source modules for reconnaissance.
Free & Open Source
Automated OSINT, threat intelligence, footprinting
Hunt down social media accounts by username across 400+ social networks.
Free & Open Source
Username OSINT, social media profiling
Digital forensics platform with GUI for analyzing hard drives and smartphones.
Free & Open Source
Disk forensics, file recovery, timeline analysis
Advanced memory forensics framework for extracting artifacts from memory dumps.
Free & Open Source
Memory forensics, malware analysis, incident response
Pattern matching tool for malware researchers to identify and classify malware samples.
Free & Open Source
Malware identification, threat hunting, IOC detection
Endpoint visibility and collection tool for digital forensic and incident response.
Free & Open Source
Endpoint monitoring, artifact collection, threat hunting
NSA's open-source software reverse engineering framework with powerful decompiler.
Free & Open Source
Binary analysis, malware reverse engineering, decompilation
Industry-standard interactive disassembler and debugger for reverse engineering.
Commercial
Disassembly, debugging, malware analysis
Open-source reverse engineering framework with CLI tools for binary analysis.
Free & Open Source
Binary analysis, exploitation, forensics
Multi-cloud security auditing tool for AWS, Azure, GCP, and more.
Free & Open Source
Cloud security auditing, misconfiguration detection
AWS & Azure security assessment tool aligned with CIS benchmarks and GDPR/HIPAA.
Free & Open Source
AWS/Azure security auditing, compliance checks
Cloud security posture management detecting misconfigurations across AWS, Azure, GCP.
Free & Open Source
Cloud misconfiguration scanning, compliance monitoring
Check out our cheat sheets, learning paths, and security writeups for hands-on guides.