Tools

Explore our curated list of tools.

259 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

Anonymity

Explore 

Cover Your Tracks 

Free    

Test your browser against tracking and fingerprinting.

I2P 

Open-source      

Fully-encrypted private network layer

Nipe 

Open-source      

Script to make Tor your default gateway

Tor 

Open-source      

Onion-routed overlay network

What Every Browser Knows About You 

Free    

Test your own Web browser's configuration

CTF Tools

Explore 

Pwntools 

Open-source      

Rapid exploit development framework for CTFs

RsaCtfTool 

Open-source      

Attack and decrypt RSA tools

DDoS

Explore 

CC-attack 

Open-source        

Socks4/5 proxy-based multithreading attack

DDOS Ripper 

Open-source          

DDOS attack server based on compromised computer systems

HOIC 

Open-source        

LOIC with countermeasure workarounds

MHDDoS 

Open-source        

Python3 DDoS attack script with 56 methods

Raven-Storm 

Open-source        

DDoS Toolkit with multiple attack protocols

SlowLoris 

Open-source        

Low bandwidth DDoS tool in Python

T50 

Open-source        

Network stress tool

UFONet 

Open-source        

Denial of service toolkit with multifunctionality

Defense and Evasion

Explore 

AntiVirus Evasion Tool (AVET) 

Open-source      

Antivirus evasion tools

Fireprox 

Open-source      

AWS API Gateway management tool for IP rotation

Hyperion 

Free      

Runtime encryptor for 32-bit portable executables ("PE .exes")

peCloak.py 

Free      

Hides malicious Windows executable from antivirus

peCloakCapstone 

Open-source      

Multi-platform fork of peCloak.py

Proxybroker2 

Open-source      

Auto-rotate IP via proxy

Dorks

Explore 

BinGoo 

Open-source    

GNU/Linux bash-based Bing and Google Dorking Tool

dork-bot 

Open-source    

Command line Google dork tool

Dorksearch 

Free    

Easy dorks with pre-build queries.

fast-recon 

Open-source    

Script to perform Google dorks against a domain

GooDork 

Open-source    

Command line Google dorking tool

snitch 

Open-source    

Scripts to use dorks to gather information

Frameworks

Explore 

Caldera 

Open-source        

A framework for adversary emulation by MITRE

Cobalt Strike 

Commercial        

A Fortra VM & threat emulation framework

Dshell 

Open-source        

Network forensic analysis framework

Empire 

Open-source        

Post-exploitation adversary emulation framework

ExploitPack 

Commercial      

Graphical tool with 39,000+ exploits for pentest automation

Metasploit 

Commercial   Open-source        

Post-exploitation pentest tools to verify vulnerabilities, manage assessments, and more.

Pupy 

Open-source      

Cross-platform remote administration and post-exploitation tool in Python & C

Recon-ng 

Open-source    

A web-based reconnaissance framework

ReNgine 

Open-source    

Open-source reconnaissance framework

routersploit 

Open-source      

Open-source exploitation framework for embedded devices

shellsploit 

Open-source      

Exploit development framework

WordPress Exploit Framework 

Open-source    

Ruby framework for WordPress pentesting

Hashing & Cryptography

Explore 

AirCrack 

Open-source      

Wifi password retrieval with FMS

BruteForce Wallet 

Open-source      

Wallet password search

ctf-tools 

Open-source      

Scripts to install various security research tools and deploy to new machines

Hashcat 

Open-source      

Hash cracking tool

John the Ripper 

Open-source      

Password cracker

JWT Cracker 

Open-source      

HS256 JWT token brute force cracker

Medusa 

Open-source      

Brute-force parallel testing password cracker

Rainbow Crack 

Free      

Hash cracker using large-scale time-memory technique

Rainbow Tables 

Free      

Rainbow table generator with verification

Hex Editors

Explore 

Frhed 

Open-source      

Binary file editor for Windows with partial file loading capabilities

FS Hex Editor 

Open-source      

Hexadecimal and ASCII file editor

Hackman 

Open-source      

Hex and binary editor with RAM viewer

HexEdit.js 

Open-source      

Browser-based hex editing

Hexinator 

Commercial      

Hex tool with free and premium versions

Hexplorer 

Open-source      

Hex editor with data mining tools

HxD Hex Editor 

Open-source      

View, edit, and save hex and source code files

Kaitai Struct 

Open-source      

Generate parsers and protocols

MiTeX Hexadecimal 

Commercial      

Hex and Octal file editor with calculator

Open Freely 

Freeware      

Hex viewer and editor

Tiny Hexer 

Open-source      

Hex viewer, binary searcher, and octal viewer

Tyrannosaurus Hex 

Open-source      

Open-source hex editor with color coding

UltraEdit 

Commercial      

Text, code, and hex editor

Veles 

Open-source      

Binary data visualization and analysis tool

IoT

Explore 

Praeda 

Open-source      

Data harvester for multi-function printer assessments

Printer Exploitation Toolkit (PRET) 

Open-source      

USB or network program for printer security mapping & exploitation

routersploit 

Open-source      

Open-source exploitation framework for embedded devices

Linux Distros

Explore 

ArchStrike 

Open-source      

Arch GNU/Linux repository closely following Linux Standards

AttifyOS 

Open-source      

GNU/Linux distribution built around IoT pentesting

BackBox 

Free        

Ubuntu-based distribution for penetration tests and security assessments

BlackArch 

Open-source      

Arch GNU/Linux-based distribution with 2,500+ tools

CAINE 

Free      

Computer Aided Investigative Environment is a digital forensics and analysis framework

Fedora Security Lab 

Free      

Test environment for security auditing, forensics, system rescue, etc.

Kali 

Free      

GNU/Linux distro for digital forensics and pentesting

Linux Kodachi 

Free      

A Debian-based distro, boot from CD/USB, filters traffic through TOR and attempts trace cleanup after use

Network Security Toolkit (NST) 

Free      

Fedora-based bootable live operating system

ParrotOS 

Open-source      

Distro featuring multiple architecture options and 100+ pentest tools

Pentoo 

Open-source      

Security-focused live USB-based on Gentoo for 32/64-bit OS

Tails 

Open-source      

Security-focused Debian-based distro for anonymity and privacy using Tor

The Pentesters Framework 

Open-source      

Distro is organized around Penetration Testing Execution Standard (PTES)

Trace Labs OSINT VM 

Free    

A virtual machine bundled with OSINT tools maintained by Trace Labs

Mobile Exploitation

Explore 

Dex2Jar 

Open-source    

Tool for Android ".dex" and Java ".class" files

Drozer 

Open-source    

A mobile app security testing framework

Frida 

Open-source    

Dynamic instrumentation toolkit

Frida "Universal" SSL Unpinner 

Open-source    

Universal unpinner

Genymotion 

Commercial    

Cross-platform Android emulator for developers & QA engineers

Jadx 

Open-source    

Command line and GUI tool for producing Java source code from Android Dex and APK files

MobSF 

Open-source    

Automated mobile app pentesting, malware analysis and security assessment framework with SAST and DAST

Network

Explore 

BetterCAP 

Open-source      

Modular, portable man-in-the-middle framework

CrackMapExec 

Open-source        

Suite of tools for network penetration

dnschef 

Open-source      

Highly configurable DNS proxy

dnsenum 

Open-source    

Perl script with DNS enumeration, zone transfer, dictionary attack, and reverse lookup functionality

Dripcap 

Open-source      

Caffeinated packet analyzer for multiple OS

dsniff 

Open-source      

Recon & infiltration tools for networks

Ettercap 

Open-source      

Comprehensive suite for man-in-the-middle attacks

evilgrade 

Open-source      

Fake update injection

impacket 

Open-source      

Network protocol toolset focused on low-impact access

Intercepter-NG 

Open-source      

Multifunctional network toolkit for recon & interception

Morpheus 

Open-source      

Automated ettercap TCP/IP hijacking tool

pig 

Open-source    

Linux packet crafting tool with a library of attack signatures

pwnat 

Open-source    

Punches holes in firewalls/NATs without port or DMZ setup required

Scap-workbench 

Open-source    

A GUI tool with SCAP Scanner and tailoring functionality

scapy 

Open-source      

Python-based interactive packet manipulation program & library

tcpdump/libpcap 

Open-source    

Command-line packet analyzer tool

Wireshark 

Open-source    

A graphic interface surrounding tcpdump / network protocol analyzer

Yersina 

Open-source    

A network tool for 2-layer attacks

OSINT

Explore 

AQUATONE 

Open-source    

Create attack surface maps of subdomains with pre-compiled binaries

C99.nl 

Commercial    

Subdomain scanning tool

Censys 

Commercial   Free    

Threat intelligence and mapping platform

creepy 

Open-source    

Geolocation gathering via social media platforms

DataSploit 

Open-source    

OSINT framework based around corporate espionage

Debookee 

Commercial    

Network traffic interception and analysis for Mac

Etherape 

Open-source    

A graphical network monitor for Unix with graphic network activity display

Maltego 

Commercial    

Open-source intelligence and graphical link analysis tool for gathering and connecting information for intelligence and forensics. (€ 999 per year)

metagoofil 

Open-source    

Metadata harvester with email extraction functions

NetCat 

Open-source    

A networking tool for reading and writing data across networks

Nipper 

Commercial    

Network configuration & audit tool for internal teams

Seclists 

Open-source    

Security testing data repository

Shodan 

Commercial   Free    

Search for Internet-connected devices

theHarvester 

Open-source    

Harvest E-mail, subdomain and names via OSINT

XRay 

Open-source    

Recon, mapping, OSINT for public networks

ZoomEye 

Commercial    

Network component search engine

Pentest Management Platforms

Explore 

AttackForge 

Commercial    

A pentest management and reporting tool

Faraday 

Commercial    

Multiuser pentesting environment for red teams performing coop tests, security audits, and risk assessments.

Reconmap 

Commercial    

A pentest collaboration platform

Pentest Report Generation

Explore 

Dradis 

Free    

Ruby-based open-source report generation tool

MagicTree 

Commercial    

Pentest report generation and streamlining tool with Nmap integration

Metagoofil 

Open-source    

Autofills metadata into reports

PeTeReport 

Open-source    

Python and Django tool to write markdown reports

PwnDoc 

Open-source    

Pentest report generation tool

Serpico 

Open-source    

Pentest report automation tool

Recon & Enumeration

Explore 

Asnlookup 

Open-source    

ASN Information tool

BlindElephant 

Open-source    

Web application identifier and fingerprinter.

Chaos 

Open-source    

Internet-wide asset data for research and recon

cms-explorer 

Open-source    

Reveal the specific modules, plugins, components, and themes run by CMS websites + associated vulnerabilities

DET 

Open-source    

Data exfiltration tool for DLP configuration errors

EyeWitness 

Open-source    

Screenshot, server header, and default credentials tool

FuzzDB 

Open-source    

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery

Have I Been Pwned? 

Free    

Service to check if your email or phone number has been compromised in a data breach

IntelX 

Commercial    

OSINT search engine and data archive for email, domain, IP, Bitcoin address, and more

OnionScan 

Open-source    

Discover vulnerabilities available through Onion-operated services

Recon_profile 

Open-source    

Alias creation tool

Retire.JS 

Open-source    

Browser plugin for finding vulnerable js libraries

Skipfish 

Open-source    

An active web-application security reconnaissance tool

smbmap 

Open-source    

SMB enumeration tool

Spiderfoot 

Open-source    

Automated OSINT and data collection

Teh_s3_bucketeers 

Open-source    

Discover S3 buckets on Amazon's AWS platform.

Transformations 

Open-source    

Browser-based data obscurity detection tool

VHostScan 

Open-source    

Virtual host scanner that performs reverse lookups

Virtual-host-discovery 

Open-source    

Enumerate virtual hosts on an IP / HTTP scanner

wafw00f 

Open-source    

Identifies and fingerprints Web Application Firewall (WAF)

Wappalyzer 

Open-source    

A browser extension to identify technologies used on websites

webscreenshot 

Open-source    

Screenshot script

WhatWeb 

Open-source    

Web scanner and fingerprinter

zmap 

Open-source    

Open source network scanner with 13+ tools for further research & scans

Red Teaming

Explore 

APT Simulator 

Open-source          

Script & toolset to simulate the appearance of an APT attack

Atomic Red Team 

Open-source          

Library of tests mapped to the MITRE ATT&CK Framework

ATT&CK Simulator 

Open-source          

Automate adversary simulations for red/blue-purple teaming

BlindSpot 

Commercial          

Adversary simulator with red-team, breach simulation, and purple team capabilities.

Caldera 

Open-source            

A framework for adversary emulation by MITRE

Cobalt Strike 

Commercial              

A VM & threat emulation framework for adversary simulation / red teaming

Cymulate 

Commercial              

Security posture management platform with red teaming

Dumpsterfire 

Open-source          

Menu-driven tool for building distributed security events for red/blue/purple team drills

GreyMatter 

Commercial              

Security operations platform with red teaming (formerly Threatcare)

Infection Monkey 

Open-source              

Open-source breach and attack simulation platform

Invoke Adversary 

Open-source          

Script for automating adversary threats

Mandiant 

Commercial              

Security validation and adversary simulation tool in Google Cloud

MATE 

Commercial          

Attack Simulator offered by Microsoft as part of 365

Metta 

Open-source          

Open-source tool for network adversarial simulation

NSAUnfetter 

Open-source              

Attack simulator based on the MITRE ATT&CK framework

Pentera 

Commercial              

Automate insider & outsider attacks for red-team/purple team exercises

Red Team Automation (RTA) 

Open-source              

Scripts based on 50+ MITRE ATT&CK tactics for blue teams

SafeBreach 

Commercial              

Breach and attack simulation platform

Scythe.io 

Commercial              

Cloud adversary emulation platform for red-team/purple team

SimSpace 

Commercial              

Simulated environment for cybersecurity exercises

Splunk Attack Range 

Open-source              

Cloud and local environment builder for attack simulation

THC Hydra 

Open-source          

Attack-simulator tool for unauthorized access

Reverse Engineering

Explore 

binwalk 

Open-source    

Analyze, reverse engineer, and extract firmware images

Capstone 

Open-source    

Lightweight multi-platform, multi-architecture disassembly framework

dnSpy 

Open-source    

.Net debugger and assembly tool

Evan's Debugger 

Open-source    

Debugger for GNU/Linux

Immunity Debugger 

Commercial    

Debugger with exploit and malware capabilities

Interactive Disassembler (IDA Pro) 

Commercial    

A multi-processor disassembler and debugger with free/premium versions

Medusa 

Open-source    

Open source, cross-platform interactive disassembler

peda 

Open-source    

Python Exploit Development Assistance for GDB

plasma 

Open-source    

Interactive disassembler for x86/ARM/MIPS

PyREBox 

Open-source    

Python scriptable Reverse Engineering sandbox and framework

Radare2 

Open-source    

Toolchain for forensics, software reverse engineering, exploiting, debugging, etc.

rVMI 

Open-source    

Full system analysis via virtual machine introspection

Voltron 

Open-source    

Debugger UK for hackers

WDK/WinDbg 

Commercial    

Microsoft Windows Driver Kit and WinDbg

x64dbg 

Open-source    

Open source x64/x32 debugger

Social Engineering

Explore 

Beelogger 

Open-source      

Tool for generating keyloggers for Windows

Catphish 

Open-source    

Ruby phishing toolkit

Evilginx2 

Open-source      

MITM attack framework used for phishing credentials and session cookies with 2-factor bypass

Gophish 

Open-source      

Powerful, open-source phishing framework to simulate and manage phishing campaigns

King Phisher 

Open-source      

Create and manage simultaneous phishing attacks with server and content tools

Social Engineer Toolkit (SET) 

Open-source      

Social engineering toolkit with framework

wifiphisher 

Open-source    

Automated phishing attacks against WiFi networks for red teaming or WiFi investigations

Static and Dynamic Analyzers

Explore 

bandit 

Open-source      

Python code analyzer with a focus on vulnerabilities

Brakeman 

Open-source      

Static analysis security vulnerability scanner for Ruby on Rails applications

Checkmarx 

Commercial        

Full suite of SAST, DAST, and code scanning tools built for internal teams

Codacy 

Commercial      

AI-driven SAST for 40+ programming languages

Coverity 

Free      

Free static analysis solution for open-source projects

cppcheck 

Open-source      

Extensible C/C++ static analyzer and bug finder

Docker Scout 

Free      

Container analysis and vulnerability insights tool from Docker

FindBugs 

Open-source      

Free Java static analyzer with a focus on bugs

Forta WebInspect 

Commercial      

Web application vulnerability scanner and analyzer

Kiuwan 

Commercial      

SAST and code analysis for vulnerability management

KlocWork 

Commercial      

Compliance-based SAST

PMD 

Open-source      

Source code analyzer for cross-language SaaS

Snyk 

Commercial      

Vulnerability database and code scanner

sobelow 

Open-source      

Phoenix Framework static analyzer focused on vulnerabilities

SonarQube 

Commercial      

Static code analysis for 30+ languages, frameworks, and platforms

Trivy 

Open-source      

Simple and comprehensive vulnerability scanner for containers and other artifacts

Veracode 

Commercial      

Static analysis and vulnerability management

Subdomain Finders

Explore 

Dirsearch 

Open-source    

Command line tool to brute force directories and files

Dnsgen 

Open-source    

This tool generates a combination of domain names from the provided input

Gau 

Open-source    

Getallurls (gau) fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl

JSParser 

Open-source    

A python script to parse relative URLs from JavaScript files

Subfinder 

Open-source    

A subdomain discovery tool that discovers valid subdomains for websites by using passive online sources

Unfurl 

Open-source    

Analyze URLs and estimate entropies to find URLs that might be vulnerable to attack

Waybackurls 

Open-source    

Accept line-delimited domains on stdin, fetch URLs from the Wayback Machine for *.domain and output them on stdout

Web Testing

Explore 

ActiveScan++ (Burp Addon) 

Open-source    

Active & passive scanning extending basic capabilities

Autorepeater Burp (Burp Addon) 

Open-source    

Automated HTTP request repeating

Autorize (Burp Addon) 

Open-source    

Detect authorization vulnerabilities

Browser Exploitation Framework (BeEF) 

Open-source      

Command and control server for delivering exploits

Burp Suite 

Commercial      

An integrated platform for web-application pentesting (Free edition available)

BurpSentinel (Burp Addon) 

Open-source    

Web application security hole discovery

Co2 (Burp Addon) 

Open-source    

SQL mapper, scanner, SAML encoder, JWT decoder, hasher

Commix 

Open-source    

Command-line injection & exploitation tool

DirBuster 

Open-source    

Brute-force over directories and web application server tool with hidden directory search

fimap 

Open-source    

Python tool to find, prepare, audit, & exploit LFI/RFI bugs.

Flow (Burp Addon) 

Open-source    

Logging and history for tools, for troubleshooting

Headless Burp (Burp Addon) 

Open-source    

Run Burp Suite's Spider and Scanner tools via command-line

Kadimus 

Open-source    

LFI scan and exploit tool.

Lazys3 

Open-source    

Ruby script to brute-force for AWS s3 buckets

LFI Suite 

Open-source    

LFI exploiter and scanner

liffy 

Open-source    

LFI exploitation tool

Logger++ (Burp Addon) 

Open-source    

A multi-threaded logging extension with filtering

NoSQLMap 

Open-source    

Audit for and automate injection attacks, exploit configuration weaknesses, and clone data

OWASP Zed Attack Proxy (ZAP) 

Open-source    

Scriptable HTTP intercepting proxy and fuzzer for web applications

ParamMiner (Burp Addon) 

Open-source    

Discover hidden web application parameters

Payloads All The Things 

Open-source    

Payloads and bypasses for Web Application Security.

Retire.js (Burp Addon) 

Open-source    

Scan for outdated Javascript libraries

SQLMap 

Open-source    

SQL injection detection, exploitation, and takeover tool

SQLNinja 

Open-source    

An SQL server injection and takeover tool

sslstrip2 

Open-source    

SSL stripping tool

SSRFTest 

Open-source    

Server Site Request Forgery tool

Subjack 

Open-source    

Subdomain identification and takeover tool written in Go

tplmap 

Open-source    

Server-side template injection, detection, and takeover tool

TurboIntruder (Burp Addon) 

Open-source    

Fast and scalable HTTP requests via python scripts

weevely3 

Open-source      

Weaponized web shell for post exploitation

WPSploit 

Open-source    

Exploit WordPress websites with Metasploit

WSDL Wizard (Burp Addon) 

Open-source    

Scan target servers for WSDL files

YsoSerial 

Open-source    

Payload generation tool to exploit unsafe Java serialization

Wireless

Explore 

Aircrack-ng 

Open-source    

Testing & auditing tools for wireless networks

Fluxion 

Open-source    

Suite of automated social engineering-based WPA attacks and analysis

Kismet 

Open-source    

Wireless network detector, sniffer, and WIDS

Reaver 

Open-source    

Brute force attack against WiFi Protected Setup.

Wifite2 

Open-source    

Python script to audit wireless networks