Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities:
1. Network Security & Monitoring Tools
- Wireshark – Network packet analyzer
- Snort – Open-source network intrusion detection system (NIDS)
- Suricata – High-performance IDS, IPS, and network security monitoring (NSM)
- Zeek (formerly Bro) – Network security monitoring tool
- Tcpdump – Command-line packet analyzer
- NetFlow Analyzer – Traffic analysis and bandwidth monitoring
- Nmap – Network scanning and mapping
- Nagios – Network monitoring and alerting
- OpenVAS – Open-source vulnerability scanner
2. Penetration Testing & Ethical Hacking
- Metasploit – Penetration testing framework
- Kali Linux – Comprehensive penetration testing OS
- Parrot Security OS – Alternative to Kali Linux with penetration testing tools
- Burp Suite – Web application security testing
- SQLmap – Automated SQL injection testing
- John the Ripper – Password cracking tool
- Hydra – Brute-force password cracking
- Aircrack-ng – Wi-Fi network penetration testing
- Nikto – Web server scanner
- BeEF (Browser Exploitation Framework) – Browser-based attack tool
- Reaver – Wi-Fi Protected Setup (WPS) attack tool
- Social-Engineer Toolkit (SET) – Social engineering attack simulation
3. Digital Forensics Tools
- Autopsy – Open-source digital forensic tool
- FTK (Forensic Toolkit) – Disk imaging and forensic analysis
- EnCase – Comprehensive digital forensic suite
- The Sleuth Kit (TSK) – File system forensics
- Volatility – Memory forensics framework
- X-Ways Forensics – Lightweight forensic analysis tool
- Magnet AXIOM – Digital investigation and analysis
- OSForensics – Advanced file system analysis
- DEFT Linux – Digital Evidence & Forensics Toolkit
- CAINE (Computer Aided Investigative Environment) – Linux-based forensic tool
- Oxygen Forensic Suite – Mobile forensic analysis
- XRY – Mobile forensics tool
- UFED (Cellebrite) – Mobile data extraction tool
4. Endpoint Security & Antivirus Tools
- Windows Defender – Built-in Windows security
- Bitdefender – Advanced endpoint protection
- Kaspersky Endpoint Security – Enterprise-level security suite
- Symantec Endpoint Protection – Comprehensive security solution
- McAfee Endpoint Security – Next-gen endpoint protection
- Sophos Intercept X – AI-driven endpoint security
- CrowdStrike Falcon – Cloud-based EDR solution
- Carbon Black (VMware) – Next-gen antivirus and EDR
5. Malware Analysis & Reverse Engineering
- IDA Pro – Disassembler for reverse engineering
- Ghidra – Open-source reverse engineering suite by NSA
- Radare2 – Reverse engineering and binary analysis
- OllyDbg – Windows debugger for malware analysis
- x64dbg – Open-source Windows debugger
- Cuckoo Sandbox – Automated malware analysis
- PEStudio – Portable executable analysis tool
- YARA – Pattern-matching tool for malware research
6. Web Security & Vulnerability Scanners
- OWASP ZAP (Zed Attack Proxy) – Web app security scanner
- Acunetix – Automated web vulnerability scanner
- Nessus – Vulnerability scanning and risk assessment
- Nikto – Web server scanner
- Burp Suite – Comprehensive web penetration testing
- Arachni – Web application security scanner
7. Cloud Security & Security-as-a-Service
- AWS Security Hub – Cloud security posture management
- Azure Security Center – Microsoft cloud security tool
- Google Chronicle – Threat intelligence and SIEM
- Palo Alto Prisma Cloud – Cloud security suite
- Qualys Cloud Security – Compliance and vulnerability management
- CrowdStrike Falcon for Cloud – Cloud-based threat detection
8. SIEM (Security Information and Event Management) & Log Analysis
- Splunk – Security analytics and SIEM
- ELK Stack (Elasticsearch, Logstash, Kibana) – Log monitoring and analysis
- IBM QRadar – Threat intelligence and SIEM
- ArcSight – Enterprise SIEM solution
- Graylog – Open-source log analysis tool
- LogRhythm – Security analytics and threat detection
9. Identity & Access Management (IAM)
- Okta – Cloud-based identity and access management
- Microsoft Active Directory (AD) – Centralized identity management
- Ping Identity – Enterprise IAM solution
- Auth0 – Authentication and authorization solution
- CyberArk – Privileged access management (PAM)
- Duo Security – Multi-factor authentication (MFA)
10. Threat Intelligence & Incident Response
- MISP (Malware Information Sharing Platform) – Open-source threat intelligence platform
- TheHive – Incident response and case management
- AlienVault OTX – Open threat exchange intelligence
- VirusTotal – Malware scanning and threat intelligence
- Palo Alto Cortex XSOAR – Security orchestration and automation
- MITRE ATT&CK Navigator – Threat tactics and techniques framework
11. Cryptography & Secure Communication
- OpenSSL – Open-source cryptographic library
- GnuPG (GPG) – Open-source encryption tool
- VeraCrypt – Disk encryption software
- TrueCrypt – Legacy disk encryption tool
- Hashcat – Advanced password recovery tool
- KeePass – Secure password manager
12. Wireless Security & Bluetooth Forensics
- Kismet – Wireless network detection and monitoring
- Aircrack-ng – Wi-Fi security auditing
- Wireshark – Wireless traffic analysis
- BlueMaho – Bluetooth security auditing
- Ubertooth – Bluetooth sniffer
13. DevSecOps & Secure Development Tools
- SonarQube – Static code analysis for security vulnerabilities
- Checkmarx – Application security testing
- Snyk – Open-source dependency vulnerability scanning
- Veracode – Application security scanning
- Dependency-Check – Software composition analysis (SCA) tool
14. Honeypots & Deception Technology
- Dionaea – Malware honeypot
- Cowrie – SSH and Telnet honeypot
- Kippo – SSH honeypot for attacker monitoring
- Honeyd – Low-interaction honeypot framework
- Canary Tokens – Digital tripwires for intrusion detection
15. Mobile Security & Mobile Forensics
- MobSF (Mobile Security Framework) – Static and dynamic analysis of mobile apps
- Appknox – Mobile security vulnerability scanning
- Drozer – Android security assessment framework
- iOS Security Suite – iOS penetration testing tools