Skip to content

πŸ›‘οΈAwesome Cybersecurity Tools πŸ”΄ VERY LARGE LIST! πŸ”΄ Curated list of Security & Hacking Tools – Updated September 2025

License

Notifications You must be signed in to change notification settings

eudk/awesome-cybersecurity-tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

5 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Awesome Cybersecurity Tools

Awesome Stars Forks Last Commit

A practical, catalog of security tools for students, red/blue teams, and builders. Focus is on widely used, well-maintained, and actually useful software across recon, web/API, cloud, containers, AD, DFIR, and more.

Format inspired by the structure and navigation style of my AI list. This one is tuned for security workflows and fast lookup.

A futuristic cyber security interface

Legal and ethical notice: Use these tools only on systems you own or are explicitly authorized to test. Many are dual-use. If you don’t have written permission, don’t touch it. This repository is intended for educational and authorized professional use only. The tools and resources listed here are for learning, security testing, and defensive research in controlled environments.


Navigation

Use your browser’s find (Ctrl+F or Cmd+F) or jump via the table:

Category What’s in it
Core / Must-Know Baseline tooling every security practitioner should know
Recon & Asset Discovery Discovery, subdomains, screenshots, tech fingerprints
Port Scanning & Enumeration Fast/precise scanning, service probing
Web App Testing Proxies, fuzzers, SQLi/XSS/dir brute, parameter miners
API Security REST/gRPC fuzzers, schema-based testing
CMS & Framework Scanners WordPress, Drupal, Joomla, general CMS
Cloud Security AWS/Azure/GCP posture, IAM hunting, S3 checks
Containers & Kubernetes Image scanning, runtime defense, CIS checks
IaC, SBOM & Dependency Risk Terraform checks, SCA, SBOM generation
Secrets Detection Git and filesystem secrets finders
Active Directory & Windows Enumeration, LLMNR/NTLM, ADCS, privesc
Network, Traffic & MITM NIDS, packet capture, dissecting, interception
Wireless & Bluetooth 802.11 capture/attacks, WPA/PMKID, BLE
Mobile Security Android/iOS reversing, instrumentation
Reverse Engineering & Binary Disassemblers, debuggers, symbolic exec
Fuzzing AFL-class fuzzers, API fuzzers
Credentials, Cracking & Wordlists Hashcat/JtR, spray/bruteforce, lists
OSINT & Threat Intel Footprinting, TI platforms, hunting
Phishing & Social Campaign frameworks, kits (defensive research use only)
C2 & Post-Exploitation Open C2, operators, pivoting
Vuln Scanning & Management Network/web scanners, template engines
DFIR & Forensics Memory, disk, Windows triage, timelines
Tunneling, Pivoting & Relays Socks/HTTP tunnels, relay tools
Helper Utilities CLI helpers that save time
Hardware, RF & OT Pentest Tools Flipper/Proxmark/SDR, embedded/JTAG, Hak5/O.MG
Books (Beginner β†’ Advanced) Curated reading path: foundations, web, RE, DFIR
Certifications Entry, offensive, blue team, cloud, governance/privacy
Hands-On Training Platforms TryHackMe/HTB, PortSwigger, OSINT/DFIR ranges
Courses & Structured Programs Free academic, vendor programs, guided tracks
Compliance ISO/NIST/CIS/GDPR/NIS2/DORA, tools, policy-as-code

Conventions

  • [F] = Free/Open Source, [C] = Commercial or paid tier available
  • OS tags: [Linux] [macOS] [Windows]
  • Short on fluff. If you need deep docs, click through.

Core / Must-Know

  • Nmap [F] [Linux macOS Windows] β€” Network scanner, service/version scripts (NSE).
  • Wireshark [F] [Linux macOS Windows] β€” Packet capture and protocol analysis.
  • Burp Suite [F/C] [Linux macOS Windows] β€” Web proxy, repeater, intruder, extensible.
  • OWASP ZAP [F] [Linux macOS Windows] β€” Web proxy/DAST alternative to Burp.
  • Metasploit Framework [F] [Linux macOS Windows] β€” Exploitation framework and post-exploitation.
  • OpenVAS / Greenbone [F] [Linux] β€” Network vuln scanning.
  • ffuf [F] [Linux macOS Windows] β€” Fast web fuzzer for dirs/params/vhosts.
  • sqlmap [F] [Linux macOS Windows] β€” Automated SQL injection/dumping.
  • Hashcat [F] [Linux macOS Windows] β€” GPU/CPU password cracking.
  • John the Ripper Jumbo [F] [Linux macOS Windows] β€” Password/cracking suite.

Back to Top


Recon & Asset Discovery

  • Amass [F] β€” Subdomain enum via multiple sources and graphing.
  • Subfinder [F] β€” Passive subdomain discovery.
  • Assetfinder [F] β€” Find subdomains via public sources.
  • httpx [F] β€” Fast HTTP probing with metadata.
  • Nuclei [F] β€” Template-based vuln checks; pair with httpx.
  • Naabu [F] β€” Fast port scanner (SYN).
  • dnsx [F] β€” DNS toolkit (resolve/brute/certs).
  • Aquatone [F] β€” Site screenshots by domain.
  • gowitness [F] β€” Fast headless browser screenshots.
  • theHarvester [F] β€” Emails, names, subdomains from search engines.
  • Shodan CLI [F/C] β€” Shodan search from terminal.
  • Censys CLI [F/C] β€” Censys lookups.

Back to Top


Port Scanning & Enumeration

  • masscan [F] β€” Very fast Internet-scale scanner.
  • rustscan [F] β€” Rapid scanner that feeds into Nmap.
  • zmap [F] β€” Single-probe Internet scanner.
  • unicornscan [F] β€” Legacy but still useful for odd cases.
  • Netcat / ncat [F] β€” Swiss-army knife for TCP/UDP.

Back to Top


Web App Testing

  • Burp Suite [F/C] β€” Intercept, modify, extend (BApp Store).
  • OWASP ZAP [F] β€” Good automation and HUD for learning.
  • ffuf [F] β€” Directory/parameter/vhost fuzzing.
  • dirsearch [F] β€” Classic content discovery.
  • wfuzz [F] β€” Flexible web fuzzing.
  • Arjun [F] β€” Hidden parameter discovery.
  • ParamSpider [F] β€” Parameter harvesting from URLs.
  • dalfox [F] β€” XSS scanning with smart injection points.
  • XSStrike [F] β€” XSS detection and exploitation.
  • tplmap [F] β€” Server-Side Template Injection checks.
  • Nikto [F] β€” Legacy but still useful web scanner.

Back to Top


API Security

  • RESTler [F] β€” Smart REST API fuzzing from Swagger/OpenAPI.
  • Schemathesis [F] β€” Property-based testing for APIs from schemas.
  • kiterunner [F] β€” API route discovery.
  • grpcurl [F] β€” gRPC probing.
  • mitmproxy [F] β€” Intercept TLS traffic; scripts for API testing.

Back to Top


CMS & Framework Scanners

  • WPScan [F/C] β€” WordPress enumeration and vuln checks.
  • droopescan [F] β€” Drupal/Joomla/CouchCMS checks.
  • joomscan [F] β€” Joomla scanner.

Back to Top


Cloud Security

  • Prowler [F] β€” AWS/Azure/GCP security benchmarking.
  • ScoutSuite [F] β€” Multi-cloud posture assessment.
  • CloudQuery [F] β€” Cloud inventory to SQL for queries.
  • CloudSploit [F] β€” Cloud configuration checks.
  • Pacu [F] β€” AWS exploitation framework (authorized research).
  • cloudfox [F] β€” CLI to find cloud attack paths.
  • S3Scanner [F] β€” Public S3 bucket discovery.
  • enumerate-iam [F] β€” IAM policy analysis.

Back to Top


Containers & Kubernetes

  • Trivy [F] β€” Image/filesystem/Repo/IaC scanning.
  • Grype [F] β€” SBOM-driven image vulnerability scanning.
  • Syft [F] β€” SBOM generation (SPDX/CycloneDX).
  • kube-hunter [F] β€” K8s attack surface discovery.
  • kube-bench [F] β€” CIS K8s benchmarks.
  • Kubescape [F] β€” K8s posture and compliance.
  • Popeye [F] β€” K8s cluster sanitizer.
  • Falco [F] β€” Runtime threat detection via eBPF.
  • Dockle [F] β€” Docker image linting.
  • Clair [F] β€” Image vulnerability analysis.

Back to Top


IaC, SBOM & Dependency Risk

  • tfsec [F] β€” Terraform static analysis.
  • Checkov [F] β€” IaC scanning (Terraform, K8s, Cloud).
  • Terrascan [F] β€” Policy-as-code for IaC.
  • Semgrep [F] β€” Code scanning with community rules (supports IaC).
  • OWASP Dependency-Check [F] β€” Java/.NET/others dependency CVEs.
  • CycloneDX CLI [F] β€” SBOM utilities.

Back to Top


Secrets Detection

  • gitleaks [F] β€” Git secrets detection.
  • trufflehog [F] β€” Secrets in repos, files, and APIs.
  • git-secrets [F] β€” Prevent committing secrets.
  • detect-secrets [F] β€” Pluggable pre-commit secrets scanner.
  • ggshield [F/C] β€” CLI with GitGuardian detectors.

Back to Top


Active Directory & Windows

Back to Top


Network, Traffic & MITM

Back to Top


Wireless & Bluetooth

  • Aircrack-ng [F] β€” 802.11 capture and key cracking.
  • hcxdumptool / hcxpcapngtool [F] β€” PMKID/handshake harvesting and conversion.
  • kismet [F] β€” Wireless IDS and surveys.
  • reaver [F] β€” WPS attacks (legacy).
  • wifite2 [F] β€” Automated Wi-Fi attack orchestration.
  • mdk4 [F] β€” 802.11 stress/attack testing.
  • BlueZ [F] β€” Linux Bluetooth stack tools.
  • btlejack [F] β€” BLE sniffing with cheap hardware.

Back to Top


Mobile Security

  • MobSF [F] β€” Mobile static/dynamic analysis.
  • Frida [F] β€” Dynamic instrumentation.
  • Objection [F] β€” Runtime mobile exploration (Frida-based).
  • jadx [F] β€” Android decompiler.
  • apktool [F] β€” APK decode/rebuild.
  • drozer [F] β€” Android security assessment (older but useful).
  • Xcode / Android Studio [F] β€” Official toolchains and emulators.

Back to Top


Reverse Engineering & Binary

  • Ghidra [F] β€” Full suite reverse engineering.
  • Radare2 / Cutter [F] β€” Disassembler/debugger with GUI.
  • Binary Ninja [C] β€” Fast reversing with APIs.
  • IDA Pro [C] β€” Industry-standard disassembler/debugger.
  • x64dbg [F] β€” Windows debugging.
  • angr [F] β€” Binary analysis with symbolic execution.
  • pwndbg [F] β€” Enhanced GDB for pwn.

Back to Top


Fuzzing

  • AFL++ [F] β€” Modernized AFL fork.
  • libFuzzer [F] β€” In-process coverage-guided fuzzing (LLVM).
  • Honggfuzz [F] β€” General-purpose fuzzer.
  • boofuzz [F] β€” Network protocol fuzzing (Sulley successor).
  • RESTler [F] β€” API fuzzing from schemas (listed above too).

Back to Top


Credentials, Cracking & Wordlists

  • Hashcat [F] β€” GPU/CPU cracking with rule/mask/PRINCE.
  • John the Ripper Jumbo [F] β€” CPU cracking and formats.
  • Hydra [F] β€” Network login bruteforcing.
  • Medusa [F] β€” Parallel login brute-forcer.
  • patator [F] β€” Flexible brute-forcer/sprayer.
  • hashid [F] β€” Identify hash types.
  • cewl [F] β€” Custom wordlist generator from sites.
  • crunch [F] β€” Wordlist generator.
  • hashcat-utils [F] β€” Rule helpers and transforms.
  • SecLists [F] β€” Wordlists for fuzzing, creds, payloads.
  • Probable-Wordlists [F] β€” Frequency-based lists.

Back to Top


OSINT & Threat Intel

  • SpiderFoot [F] β€” Automated OSINT.
  • Maltego CE [F/C] β€” Graph OSINT with transforms.
  • Recon-ng [F] β€” OSINT framework.
  • GHunt [F] β€” Google OSINT.
  • Photon [F] β€” Fast crawler for intel.
  • MISP [F] β€” Threat intel platform for IOCs.
  • OpenCTI [F] β€” Threat intel knowledge base.

Back to Top


Phishing & Social

Research and defense testing only, with explicit authorization.

  • Gophish [F] β€” Phishing framework for training/testing.
  • King Phisher [F] β€” Flexible phishing campaigns.
  • Evilginx2 [F] β€” Adversary-in-the-middle framework for auth research.
  • Modlishka [F] β€” Reverse proxy for login flows (research).

Back to Top


C2 & Post-Exploitation

Operate only in lab or with written authorization. Many tools are detected by EDR by default.

  • Sliver [F] β€” Open C2 framework.
  • Mythic [F] β€” Plugin-based C2 with multiple agents.
  • Havoc [F] β€” Modern C2.
  • Covenant [F] β€” .NET C2 framework.
  • Empire (BC-Security) [F] β€” PowerShell/C# post-exploitation.
  • PoshC2 [F] β€” PowerShell C2.
  • Merlin [F] β€” Cross-platform agent over HTTP/2.
  • Quasar [F] β€” Windows remote admin (research).

Back to Top


Vuln Scanning & Management

Back to Top


DFIR & Forensics

Back to Top


Tunneling, Pivoting & Relays

  • chisel [F] β€” TCP/UDP over HTTP tunneling.
  • ligolo-ng [F] β€” Reverse tunneling/proxy.
  • frp [F] β€” Fast reverse proxy.
  • sshuttle [F] β€” Poor man’s VPN over SSH.
  • socat [F] β€” Bidirectional relay swiss-army knife.
  • rinetd [F] β€” Simple TCP redirection.

Back to Top


Helper Utilities

  • ripgrep β€” Fast grep replacement.
  • fzf β€” Fuzzy finder in terminal.
  • bat β€” Better cat with syntax highlight.
  • jq / yq β€” JSON/YAML processing.
  • httpie β€” Human-friendly HTTP client.
  • pv β€” Pipe progress meter.

Back to Top


Hardware, RF & OT Pentest Tools (Flipper-class and beyond)

Legal/ethical: use only on systems you own or have written authorization to test.

Back to top


Books (Beginner β†’ Advanced)

Absolute Beginner / Career On-Ramp

Foundations (Must-read)

Networking, Packets & Blue Team

Web/AppSec

Reverse Engineering, Exploit Dev & Malware

Architecture, Threat Modeling & Culture

Free Standards/Guides (bookmark)

Back to top


Certifications (by level and intent)

Get what your target role requires; hands-on > theory for pentest/DFIR roles.

Entry / Baseline

Offensive / Pentest / Red Team

Blue Team / DFIR / Detection

Cloud & Platform

Governance / Privacy / Audit

Back to top


Hands-On Training Platforms (labs, ranges, CTFs)

Back to top


Courses & Structured Programs

Free / Open Academic

Vendor/Platform Programs

Back to top


Compliance (Frameworks, How to Learn, Tools, Compliance-as-Code)

Goal: understand frameworks, map controls to real telemetry, automate evidence, and continuously monitor. EU-centric bits included (NIS2/GDPR/DORA).

Core Frameworks & Standards (know these)

How to Learn Compliance (practical track)

  1. Pick two frameworks: one management (ISO 27001 or NIST CSF) + one technical (CIS Controls or 800-53). Learn their structure and vocabulary.
  2. Scope & asset inventory: define boundaries; build an inventory (devices, apps, data flows, cloud accounts). Tools: osquery, Open-AudIT, CloudQuery.
  3. Risk management basics: simple risk register (asset, threat, likelihood, impact, control). Use ISO 27005 or NIST 800-30 as structure.
  4. Control mapping: create a control matrix mapping ISO 27001 Annex A ↔ CIS Controls ↔ NIST CSF. Keep it in Git (CSV/Markdown).
  5. Select policies: start with Acceptable Use, Access Control, Logging/Monitoring, Incident Response, Change Management, Secure Dev. Version them in Git; link each to controls in your matrix.
  6. Implement telemetry: enable logs & metrics that prove controls (e.g., MFA enforced, admin actions audited, EDR coverage %). Prefer Elastic/OSSEC(Wazuh)/Defender/Sentinel in labs.
  7. Evidence collection: automate screenshots, config exports, and queries (e.g., Azure AD sign-in risk policy, AWS Config conformance). Store in a timestamped evidence folder per control.
  8. Continuous control monitoring (CCM): pick 10 controls (MFA, patch SLAs, backups tested, encryption at rest, etc.). Automate daily checks with osquery, Wazuh, cloud configs, and IaC scanners.
  9. Internal audit & SOA: for ISO, maintain a Statement of Applicability; schedule internal audits; track corrective actions in an issue tracker (Jira/GitHub).
  10. Tabletop & incident drills: run 2–3 tabletop exercises (ransomware, credential compromise, lost laptop). Record lessons learned as evidence for governance clauses.

GRC & Evidence Management (open-source first)

  • eramba (Community Edition) β€” Open-source GRC (policies, risk, audits, compliance). https://www.eramba.org
  • OpenControl / Compliance-Masonry β€” YAML-based control catalogs & docs (FedRAMP origins; still useful conceptually). https://open-control.org
  • OSCAL (NIST) β€” Machine-readable security controls (XML/JSON/YAML) to model systems and assessments. https://pages.nist.gov/OSCAL/
  • Documize / Git + Markdown β€” Lightweight policy repository with versioning; simple beats bloated.

Technical Compliance & Benchmark Scanners

Policy-as-Code / Compliance-as-Code (shift-left)

Continuous Control Monitoring (endpoint/logging)

Cloud-Native Governance

Privacy (EU-centric)

Templates & Starters (use, then customize)

Student Lab Checklist (ISO-27001-ish mini ISMS)

  • Scope a small lab (laptop, Kali VM, Windows VM, small cloud account).
  • Create a lightweight ISMS folder: Policies/, RiskRegister.csv, Assets.csv, ControlMatrix.csv, Evidence/.
  • Enforce MFA, BitLocker/FileVault, baseline firewall, auto-patch, EDR.
  • Enable central logging (Wazuh/Elastic), document retention.
  • Run Lynis/OpenSCAP on hosts; Prowler/ScoutSuite on cloud; kube-bench if you use K8s.
  • Monthly: audit users/admins, key rotation, backup restore test, tabletop IR scenario.

Back to top

About

πŸ›‘οΈAwesome Cybersecurity Tools πŸ”΄ VERY LARGE LIST! πŸ”΄ Curated list of Security & Hacking Tools – Updated September 2025

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published