• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

List of Hack Tools and Network Security Hackers often use

AnonyViet by AnonyViet
January 27, 2023
in Security
0

In this article, I will bring you over 30 open source security tools that you must have to protect yourself. Synthesis of software, hacking and security tools that are free but very useful if you follow the Pentest route.

Join the channel Telegram of the AnonyViet 👉 Link 👈

List of Hack Tools and Security Hackers often use

1. BetterCAP

BetterCAP commonly used by pentester and security reviewers. This tool and framework is very useful when performing man-in-the-middle (MitM) attacks.

2. MISP (Malware Information Sharing Platform)

MISP collect, store and distribute security metrics and detected threats. This makes the platform very useful for those involved in security incidents and malware research.

Users benefit from having a well-tested platform to structure the large amount of data points available when it comes to security threats.

The tool can also interact with other tools, such as security incident and event management (SIEM) and intrusion detection systems (IDS).

3. TheHive (security incident response platform)

TheHive It is extensible and a complete platform for dealing with security incidents. It allows the person responsible to deal with such incidents and related events.

It can even use MISP project data, making it easy to start analyzing the target network.

4. Archery (vulnerability assessment and management)

Archery is a tool to help collect data about vulnerabilities in a test environment. Instead of focusing on the actual scanning process, it allows the management of findings in a web interface.

This includes options like reporting, searching, and overviewing issues. It can interact with other tools, including well-known vulnerability scanners.

5. Intrigue Core (attack surface discovery)

Intrigue Core provides a framework for measuring the vulnerability of a test environment. This includes infrastructure and application discovery, security research, and vulnerability discovery.

Intrigue also allows to enrich existing data and perform OSINT (open source intelligence) research.

Scans include DNS subdomain brute force, email collection, IP geolocation, port scanning, and use of public search engines such as Censys, Shodan, and Bing.

6. IVRE (network traffic scout)

-digital forensics, information gathering, intrusion detection, network analysis-

IVRE is a framework that performs network traffic monitoring. It leverages other tools to get the data and display it in the web interface.

7. Moloch (cyber security monitoring)

-network security monitoring, security monitoring-

Tools like Moloch is a great addition for those who work with network data. One of the most common use cases is network security monitoring (NSM). This is a way that can make all data more accessible and better find anomalies in the data.

8. GasMask (open source intelligence gathering tool)

-Collect information-

GasMask is an open source intelligence collection tool (OSINT). It can be used to discover more information about a specific goal. The sources it uses include search engines like Bing, Google, and Yandex. In addition, it pulls information from GitHub, YouTube, and social networking platforms like Twitter.

9. Vault (storage secret)

-password manager, secret manager, secure storage-

Vault is a secret management tool created by HashiCorp. It allows users to store secrets, such as key/value pairs.

AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and other sensitive stuff. These secrets are often used by software and scripts.

The benefit of using a secret management tool is that they no longer need to be stored in configuration files. Key features include leasing, key revocation, key revocation, and auditing.

10. Maltrail (malicious traffic detection system)

-intrusion detection, network analysis, security monitoring-

Maltrail monitors traffic on the network and can indicate system intrusions or other bad behavior.

This tool is great to use for intrusion detection and monitoring.

11. Gophish (phishing toolkit)

-security awareness-

Gophish is the best phishing tool to test users’ perception of security in an organization. By setting up a scam project, testers can find out how many people in an organization fall into a pre-prepared trap.

12. AIL framework (data parsing and information leakage framework)

-data extraction, data leak detection, information leak detection, security monitoring-

AIL is a framework module that helps analyze potential information leaks. The framework is quite flexible and can also support different types of formats and data sources. For example, one of AIL’s data sources is Pastebin. A tool like AIL is often used to detect or even prevent data leaks.

13. Manticore (binary analysis tool)

-binary analysis, malware analysis, reverse engineering-

Manticore is a binary analysis tool. It supports Linux ELF binaries and Ethereum smart contracts. This tool helps to study binaries and their behavior. This can be helpful when learning how malware works and troubleshooting.

14. Snallygaster (detects sensitive files on web servers)

-data leak detection, sensitive information detection, information leak detection-

Snallygaster helps detect files that you would normally not want to expose on your web server. Including files related to software repositories (e.g. .git), web shells.

15. OpenSCAP (data security toolkit)

-security assessment, vulnerability scanning-

OpenSCAP is a group of tools that help administrators and auditors evaluate, measure, and enforce security baselines.

16. OpenVAS (vulnerability scanner)

-penetration testing, security assessment, vulnerability scanning-

OpenVAS is a framework that includes a number of services and tools that provide vulnerability scanning and vulnerability detection in a management solution.

17. CAIRIS (safety systems modeling tool)

Tools like CAIRIS can be used to build security measures for your software and system design. It allows users to track interactions between objects, data points, and associated risks.

18. Infection Monkey (security test for data centers and networks)

Infection Monkey Very useful for security assessment to check for weaknesses in the network. By automating the mining phase as much as possible, it will help us find any easy targets in the data center.

19. Lynis (security scanner and configuration checker)

Lynis can detect vulnerabilities and configuration errors. The tool has a scanner to find vulnerabilities, Lynis aims for continuous improvement.

For this reason, it requires to be executed on the host system itself and needs to provide more information than conventional vulnerability scanners.

20. Vuls (untargeted vulnerability scanner)

-system booster, vulnerability scan-

Vuls is a vulnerability scanner for Linux and FreeBSD. It is written in Go, and can be logged remotely to find software vulnerabilities. It has multiple scan levels, from quick scan to deep scan with extensive analysis.

21. The Zeek Network Security Monitor

Zeek It is a very powerful framework for network traffic analysis and security monitoring.

22. RapidScan – Multi-Tool Web Vulnerability Scanner

Target of RapidScan is to solve problems through automation. For example, run multiple scanning engines to detect vulnerabilities, evaluate effectiveness, etc.

23. TheFatRat

Thefatrat a Hack tool with many functions: Tool to easily create backdoors and exploit attacks like browser attacks, etc. This tool compiles malware with common payloads and then the malware is compiled can be executed on windows, android, mac. Malware created with this tool is also capable of bypassing most antivirus protections.

24. Osmedeus

Osmedeus allows you to automatically run a great collection of tools for reconnaissance and vulnerability scanning against your target.

25. Vulscan – Vulnerability Scan with Nmap

Vulscan is an enhanced module of nmap for vulnerability scanners. The nmap -sV option enables per-service versioning to be used to identify potential product flaws. The data will be looked up in the offline version of VulDB.

26. Sn1per

Sn1per Community Edition is an automated scanner that can be used during penetration testing to list and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting add-on for professional pentesters, bug hunters, and enterprise security teams to manage large environments.

27. Phpsploit

Phpsploit is full of features, and it can silently exist on the web server through the PHP oneliner.

28. Anubis

Anubis is a subdomain statistics and information gathering tool. Anubis collates data from a variety of sources, including HackerTarget, DNSDumpster, x509 certs, VirusTotal, Google, Pkey, and NetCraft.

29. BlackWidow

BlackWidow is a python based web application to collect subdomains, URLs, dynamic parameters, email addresses and phone numbers from a particular website. This project also includes Inject-X fuzzer for dynamic URL scanning for common OWASP vulnerabilities.

30. VulnX

Vulnx is an Intelligent Bot Auto Shell Injector tool that detects vulnerabilities in many types of Cms.

31. Trape

Trape is an OSINT research and analysis tool that allows anyone to track and execute attacks social engineering in real time.

32. Tool-EXP

Tool-X is a Kali Linux hack tool installer for Termux and linux systems. Tool-X is developed for Termux and linux based systems. Using Tool-X, you can install closer to 370 hacking tools in Termux (android) and other Linux-based distributions. Currently Tool-X is available for Ubuntu, Debian, …

33. OWASP Nettacker

Project OWASP Nettacker is created to automatically collect information, scan for vulnerabilities, and ultimately generate reports, including services, errors, vulnerabilities, misconfigurations, and other information.

This software will use TCP SYN, ACK, ICMP and many other protocols to detect and bypass Firewall / IDS / IPS devices. By leveraging a unique method in OWASP Nettacker to discover protected devices and services such as SCADA. It gives a pretty big competitive advantage over other scanners making it one of the best.

The article achieved: 5/5 – (100 votes)

Tags: HackhackersListnetworksecuritytools
Previous Post

[Infographic] Guide to search effectively with Google

Next Post

How to increase Android phone RAM with MicroSD card

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
How to increase Android phone RAM with MicroSD card

How to increase Android phone RAM with MicroSD card

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

[Godot Engine] Export to Windows, Linux, MacOS, Android

[Godot Engine] Export to Windows, Linux, MacOS, Android

June 4, 2025
Apple Pay supports NAPAS cards: The future of non -contact payment in Vietnam

Apple Pay supports NAPAS cards: The future of non -contact payment in Vietnam

June 4, 2025
[Godot RPG] #2: Character

[Godot RPG] #2: Character

June 3, 2025
Gemini Live on iOS: Camera sharing feature and new screen

Gemini Live on iOS: Camera sharing feature and new screen

June 3, 2025
[Godot Engine] Export to Windows, Linux, MacOS, Android

[Godot Engine] Export to Windows, Linux, MacOS, Android

June 4, 2025
Apple Pay supports NAPAS cards: The future of non -contact payment in Vietnam

Apple Pay supports NAPAS cards: The future of non -contact payment in Vietnam

June 4, 2025
[Godot RPG] #2: Character

[Godot RPG] #2: Character

June 3, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

[Godot Engine] Export to Windows, Linux, MacOS, Android

[Godot Engine] Export to Windows, Linux, MacOS, Android

June 4, 2025
Apple Pay supports NAPAS cards: The future of non -contact payment in Vietnam

Apple Pay supports NAPAS cards: The future of non -contact payment in Vietnam

June 4, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply