In the interest of assisting the cybersecurity in defending their systems, networks and data, we are providing links to a variety of freely available tools for download and use. We do not develop or maintain any of these, but we do hope their availability is helpful in keeping information secure. If you have any comments recommended resources that you don't see here, please feel free to contact us.
A vulnerability scanner capable of authenticated and unauthenticated testing.
Open source intelligence (OSINT) tool designed to crawl the web.
Vulnerability and configuration assessment tool featuring auditing, profiling, sensitive data discovery, patch management and analysis.
https://www.tenable.com/products/nessus
Search engine for identifying Internet-connected Internet of Things (IoT) platforms, servers and various smart devices.
Free domain research web service for Domain Name Server (DNS) information such as hosts, subdomains and associated vulnerabilities.
Dark web search engine with API for automaton of searches. Can be used from open web.
Digital archive of the web that allows for historic searches of web pages. No censoring of content.
A wireless device detector and packet analyzer and intrusion detection system.
EtherApe is an open-source graphical network monitoring and traffic analysis tool.
Suite of tools for monitoring packets, testing hardware, cracking passwords and launching attacks on Wi-Fi networks.
Windows-based tool capable of cracking encrypted passwords, sniffing network traffic, recording VoIP conversations, and analyzing routing protocols.
Password cracker available for many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS.
Brute force password cracker. Available for Windows, Linux, Free BSD, Solaris and OS X.
Remote password cracker that supports many different authentication types.
https://www.darknet.org.uk/2006/09/brutus-password-cracker-download-brutus-aet2zip-aet2/
Open source passive network sniffer and forensic analysis tool capable of enumerating operating systems, sessions, hostnames, open ports.
Internet-scale port scanner. Known for speed. Includes web interface.
Free and open source network graphing solution. Can monitor network traffic by polling a network switch or router interface via SNMP.
Free and open source software system and network monitoring platform.
Free and open-source network scanning utility with the ability to scan individual IP addresses.
Free and open source network threat detection engine. Can use Sort rulesets.
Security monitoring platform; only runs on tcl/tk-based operating systems.
Host-based IDS, file integrity checking, log file monitoring/analysis, rootkit detection, etc...
Kali Linux is a Debian-based Linux distribution which includes various penetration testing and forensics capabilities.
Vulnerability scanning, penetration testing, and web app security platform for applictions.
A web application penetration-testing tool with both automated and manual capabilities.
An attack and audit framework that identifies and exploits web application vulnerabilities.
An attack tool that automates detection and exploitation SQL injection vulnerabilities.
Utility for generating outbound and inbound network traffic - a TCP or UDP connection.
Linux and Unix utility for packet manipulation/generation as well as network scanning/discovery and packet sniffing.
Crafts network packets to test cyber defenses.
https://www.colasoft.com/download/products/download_packet_builder.php
A packet crafting tool which can intercept, modify, and rewrite egress network traffic.
OpenSSH is a suite of secure networking utilities including traffic encryption, secure tunneling and authentication and key management.
A browser and associated network designed for highly anonymized communication and access to the Dark Web.
Free end-to-end encrypted e-mail tat leverages both RSA and AES-256 for security.
Free open source disk encryption software for Windows, Mac OSX and Linux.
A malware research and detection tool that utilizes a rules to create descriptions of malware families based on textual or binary patterns.
Memory forensics and file analysis for malware identification.
A malware analysis service that detects and analyzes threats using CrowdStrike’s Falcon Sandbox technology.
A malware analysis service that detects and analyzes threats against known signatures from many antivirus signatures.
A GUI-based open source hard drive and smart phone digital forensic tool.
Copyright © 2021 RPM Consulting - All Rights Reserved.