Popular Cyber Tools Graphic

Popular Cyber Tools

The information security tools are widely used by information security professionals and server admins. Most of these tools are used for security testing and network analyzing to find out application vulnerability.


The popular information security tools are as listed below.




It is the widely-used network protocol analyzer commonly used by many commercial and non-profit enterprises, government agencies, and educational institutions.

  • Protocol Inspection
  • Packets Analyzer
  • Live Capture & Offline Analysis
  • GUI & Command Line (TShark)
  • Rich VoIP Analysis
  • Coloring rules for packets
  • Multi-platform (Windows, Linux, Mac, FreeBSD, NetBSD, etc).
  • Multiple capture file formats (tcpdump, Pcap NG, Sniffer® Pro, etc)
  • Data source - Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, etc.
  • Decryption support for protocols - IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2




A full-featured vulnerability scanner. It forms the Greenbone Vulnerability Management solution in combination with additional Open Source modules.


  • Vulnerability Scanner
  • Unauthenticated Testing
  • Authenticated Testing
  • Detects security issues
  • Generates detailed report having possible discovered security vulnerabilities
  • Free software, licensed under the GNU General Public License
  • Supports plugins written in the Nessus Attack Scripting Language, NAS


OWASP ZAP - OWASP Zed Attack Proxy


Most popular free security tools actively maintained by hundreds of international volunteers. These tools can be used to test the security of web applications.


  • AJAX Spidering
  • WebSocket Testing
  • Fuzzing
  • Flexible Scan Policy
  • REST APIs Testing
  • Official Jenkins Plugin for CI
  • Active Scan
  • Passive Scan
  • Filters
  • HTTP Sessions
  • Anti CSRF Tokens
  • Spider




It's a connectivity tool for remote login with the SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks.


  • Remote Login
  • File Transfer
  • SSH Tunneling
  • Developed by developers of the OpenBSD Project using BSD-style license


OpenSSH is not a single program and it's a suite of tools. The tools available within the OpenSSH suite are as listed below.


  • Remote operations using SSH, SCP, and SFTP
  • Key management with ssh-add, ssh-keysign, ssh-keyscan, and ssh-keygen
  • Service side consists of sshd, sftp-server, and ssh-agent




It's an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.


  • Powerful detection engine
  • Penetration Testing
  • Database fingerprinting
  • Flexible Scan Policy
  • Inject malicious code
  • Detect and exploit SQL injection flaws
  • Access database
  • Edit or delete data
  • Supported database systems - MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, Informix, HSQLDB and H2
  • Fully supports all the SQL injection techniques - boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries and out-of-band
  • Support to enumerate - users, password hashes, privileges, roles, databases, tables, and columns
  • Automatic recognition of password hash formats and support for cracking them using a dictionary-based attack
  • Dump entire database or selected tables or selected columns




It is a visual link analysis tool that comes with Open Source Intelligence(OSINT) plugins also called as transforms. It can be used to mine and gather the information to represent it in a useful and meaningful way to identify key relationships between information and identify previously unknown relationships between them. It's useful in the forensic, security, and intelligence fields.


  • Real-Time Data Mining
  • Information Gathering
  • Used by security professionals
  • Ships with Kali Linux
  • Represents information on node-based graph making patterns
  • Identify multiple order connections between gathered information
  • Community and Commercial editions available




It's the world's fastest password recovery tool. It's an advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. It's licensed under the MIT license and freely available.


  • Password Recovery
  • Password Cracking
  • Distributed password cracking
  • Code adheres to gnu99 standards
  • Supports hardware accelerators including CPU, GPU, etc
  • Available on Linux, Windows, and macOS


NMAP - Network Mapper


Utility used for network discovery, and security auditing. It's also being popularly used for network inventory, managing service upgrade schedules, and monitoring host or service uptime.


  • Device Identification
  • Security Scanning
  • OS and open ports detection
  • Free & Open Source
  • Rapidly scan large networks
  • Available on Linux, Windows, and macOS


The Nmap suite includes


  • Zenmap - An advanced GUI and result viewer
  • Ncat - Flexible data transfer, redirection, and debugging tool
  • Ndiff - Utility to compare scan results
  • Nping - Packet generation and response analysis tool


John the Ripper


It is a fast password cracker, currently available for many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS.


  • Brute Force Attack
  • Dictionary Attack
  • Common passwords list
  • Word lists for 20+ human languages
  • Supports password hashes including yescrypt, crypt_blowfish
  • Proactive password strength checking with passwdqc
  • Free & Open Source
  • Commercial Pro version
  • Available on Linux, Windows, and macOS


Nessus - Vulnerability Scanner


It is a proprietary Vulnerability scanner developed by Tenable, Inc.


  • Vulnerability Scanning
  • Updated database on a daily basis
  • Free & Commercial versions
  • It can scan operating systems, network devices, hypervisors, databases, and web servers
  • Plugins are written in the Nessus Attack Scripting Language (NASL)
  • It can also support configuration and compliance audits, SCADA audits, and PCI compliance




It provides information about security vulnerabilities and aids in penetration testing and IDS signature development.


  • Penetration Testing
  • Ethical Hacking
  • Security Auditing
  • Pre-installed on Kali Linux
  • Find, Exploit, and Validate vulnerabilities
  • Open source Metasploit Framework
  • Commercial support available via Metasploit Pro




A suite of tools to assess WIFI network security.


  • WIFI Network Security
  • WEP/WPA Key Recovery
  • Monitors and capture packets for further analysis
  • Replay attacks, deauthentication, fake access points via packet injection
  • Command line tools
  • Works on Linux, Windows, OS X, FreeBSD, OpenBSD, NetBSD


The Aircrack-ng suite includes


  • aircrack-ng - Cracks WEP keys
  • airdecap-ng - Decrypts WEP or WPA encrypted capture files
  • airodump-ng - Packet sniffer
  • airserv-ng - Access the wireless card from other computers
  • easside-ng - Communicates to an access point, without the WEP key


The other command line tools available in Aircrack-ng suite are airmon-ng, aireplay-ng, airtun-ng, packetforge-ng, ivstools, airbase-ng, airdecloak-ng, airolib-ng, buddy-ng, tkiptun-ng, wesside-ng


Burp Suite


It is a graphical tool for testing and scanning Web application security.


  • Web Vulnerability Scanner
  • Web Proxy
  • Detects server-side vulnerabilities
  • Web application crawler
  • Interactive Application Security Testing (IAST)
  • Freely available as Community edition
  • Commercially available as Professional and Enterprise editions




Iron Web Application Advanced Security testing Platform - It is an open source tool used for web application vulnerability testing.


  • Open Source Framework
  • Built using Python and Ruby
  • Report generation
  • Vulnerability Scanner
  • Extensible to develop own tool
  • The author also released SBoxr for client-side testing


Notes: This list collectively shows the popular and commonly used information security tools.