50 Online Tools Every Cyber Security Professional Should Know About
There a notion in cyber security that the job of a cyber aggressor is much easier than that of a cyber security professional. Cyber assailants just need to get right once to wreak havoc on the systems and devices within a defending network. A defending network has to get security right 100% of the time to remain secure. With the range of newly connected devices growing exponentially (think tracking beacons, refrigerators, and even stop lights), there are more potential vulnerabilities than ever. Cyber security professionals are only human (for now), so the mantra has truly become how do cyber security professionals work smarter, rather than harder. One key element in this equation is that of the tools available to cyber security workers. While there are certainly scores more cyber security tools than we’ve included on this list, a vast majority of cyber security analysis and monitoring tasks can be performed with the tools below. Besides using most of the tools ourselves, we’ve scoured the internet to find the most widely used and supported tools. This is important as when you have questions about the effective use of a tool below (and you will), you’ll want to reach out to communities that are actively implementing this tool in production environments. While a number of the tools below effectively fall into multiple categories, for the sake of browsing we’ve broken the tools into the following primary categories.Jump To:
- Tools for Hardening Networks
- Tools to Secure Emails
- Tools for Internet Security
- Tools for Auditing of Networks and Networking
- Tools for SIEM
- Tools for Scanning Vulnerabilities
- Tools for Penetration Testing
- Tools for Breach Alarms
- Tools for Management and Attacking of Passwords
- Tools for Encryption
- Suites of Tools or Cyber Security Frameworks
- Tools for Cyber Security Reconnaissance
- Tools for Learning Cyber Security Tools and Concepts
Tools for Network Hardening
TCPCrypt

Argus

PacketFence

WireShark

SecurityIQ PhishSim

Tools for Securing Emails
Lucy

Spamihilator

Send 2.0

Mailwasher

Tools for Internet Security
NoScript

GetLinkInfo

Ghostery

Chrome Cleanup Tool

Tools for Auditing of Networks and Networking
NMAP

openNAC

SolarWinds Network Discovery Tool

Tools for SIEM
Netwrix Event Log Manager

SIEMonster

Splunk

Alienvault OSSIM

Tools for Scanning Vulnerabilities
OpenVAS

Nessus

Burp Suite

Shodan

Tools for Penetration Testing
Aircrack-ng

John the Ripper

Metasploit

Kali Linux

Tools for Breach Alarms
SpyCloud

HaveIBeenPwned

BreachAlarm

Tools for Management And Attacking of Passwords
HashCat

CyberArk’s Enterprise Password Vault

LastPass Enterprise and Team

Cain and Able

Tools for Encryption
SoftEther

Signal

NoMoreRansom

BitLocker

Suites of Tools of Cyber Security Frameworks
Resolver Threat and Vulnerability Management Software

Acunetix

Solarwinds Threat Monitor

Tools for Cyber Security Reconnaissance
The Harvester

OSINT Framework

CheckUserNames

Cynsys

Tools for Learning Cyber Security Tools and Concepts
Kali Linux Revealed

Springboard

Cybrary

Open Security Training
