Cyber Security tools list

Author Topic: Cyber Security tools list  (Read 3535 times)

Offline sagar.swe

  • Newbie
  • *
  • Posts: 29
  • Test
    • View Profile
Cyber Security tools list
« on: July 09, 2015, 09:58:30 PM »
This list is an collection of cyberwarfare and cybercrime tools. Security tools that have been collected from the internet can be found here. They all have an legit and trusty source.

The tools that criminals use are mostly the same tools that security experts use to audit their systems. This goes the same for cyberwarfare and cybercrime tools. Cyberwarfare or hacktivism tools like DDOS scripts are used by pentesting experts to pentest and audit an environment.

Security tools like Firewall Analyzers and password cracking tools are needed to create and provide secure environments. This list offers an wide range of tools: real time protection tools, portable anti virus programs, anti rootkit tools, sniffing tools and several company provided tools.

Pro-actively protect your IT infrastructure with BackBox. It is the perfect security solution; providing pen-testing, incident response, computer forensics, and intelligence gathering tools. The most current release of BackBox Linux includes the latest software solutions for vulnerability analysis/assessment and pen-testing. It is one of the lightest/fastest Linux distros available on the Internet.

Download Backbox 2013
Kali Linux

From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created. BackTrack has grown far beyond its humble roots as a live CD and has now become a full-fledged operating system. With all this buzz, you might be asking yourself: – What’s new ?
Security tools

You can find a lot of security tools on the internet. But it is hard to find the right tool for the right job. Here you will be able to download firewall analyzers and several security tools. Cyberwarzone has listed these tools for you.

    If you believe we missed out on a security tool you can send us an message or simply post it as an comment.

Real time protection
Real time protection tools Avast!    Free
Ad-Aware    Free
AVG    Free
Panda Cloud    Free
Avira free antivirus    Free
Microsoft Security Essentials    Free
Comodo    Free
Fprot (with Returnil)    Free
PC Tools Free    Free
FortiClient Lite    Free
Unthreat Antivirus    Free
Preventon    Free
Rising    Free
Zillya!    Free
NANO    Free
Digital Defender    Free
ClearSight    Free
Zoner    Free
BkavHome    Free
CMC Infosec    Free
Clam Sentinel    Free
Moon Secure    Free

Ainvo Antivirus    Free
Portable anti-virus programs
Portable anti-virus programs DrWeb cureit
Emsisoft Emergency USB Stick files
Avira DE-Cleaner
Microsoft Safety Scanner
AVZ / AVZ database
Norman malware cleaner
Panda ActiveScan Cleaner
Trendmicro Sysclean
ArcaVir MicroScan
Zillya! Scanner
Spybot Portable
ClamWin Portable
Guardiano Assembler
Anti Root kit
Anti Root kit TDSS Killer
Avast MBR Scanner
Kernel Detective
VBA anti-rootkit
Sanity check
Rootkit Unhooker
Bitdefender Bootkit Removal Tool
mbr tool
Kill bootkits
Hypersight Rootkit Detector
Firewall analyzer

Security is effective when you know what is going on in your environment. The most of us protect ourselves with Firewalls, IDS, IPS and multiple monitor tools.

These devices and tools all create logfiles that can be analyzed to
Firewall Analyzers Software    Free / Paid    Download link
Firemon    Paid
Barracudanetworks    Paid
Splunk    Paid
Monitor tools

If you want to monitor your environment you can use these monitor tools to find out what is happening in your environment.
Monitor tools Software    FREE / Paid    Download link
Zenoss Core    Free
NTA Monitor    Free

Do you need to analyze an packet? You can use this packet analyzers to sniff packets that cross your network. You can analyze network problems, detect network intrusion attempts and more.
Sniffers Software    Free / Paid    Download link
Wireshark    Free

Code Review Tools

Tools to review code.
Code Review Tools Software    Free / Paid    Download link
Rough Auditing Tool for Security    Free
Config Review Tools

Tools to review config files.
Config Review Tools Software    Free / Paid    Download link
Apache Benchmark    Free
Microsoft Best Practice Analyzer    Paid
Database Tools
Database Tools Software    Free / Paid    Download link
SQL Server Express Utility    Free
MySQL Command-Line Tool    Free
Leviathan    Free
WinSQL without installer    Free
Debugging Tools
Debugging Tools Software    Free / Paid    Download link
OllyDbg    Free
Forensic Tools
Forensic Tools Software    Free / Paid    Download link
Mandiant Red Curtain    Free
Mandiant Red Line    Free
Fuzzer Tools
Fuzzer Tools Software    Free / Paid    Download link
Skipfish    Free
WSFuzzer Project    Free
FileFuzz    Free
Fuzzdb    Free
SAP tools
SAP Tools Software    Free / Paid    Download link
SAPYTO    Free

LIVE ISO Software    Free / Paid    Download link
Backtrack    Free
Hiren    Free
Great Tool resources
Other resources Software    Free / Paid    Download link
HackArmoury    Free
Microsoft    Free
Phenoelit    Free
techsupportalert    Free    Massive tools list
Kaspersky Free Tools
Kaspersky Virus Removal Tool    free    Virus Removal Tool is a utility designed to remove all types of infections from your computer. It implies effective algorithms of detection used by Kaspersky Anti-Virus and AVZ. It cannot substitute a resident antivirus application.
Kaspersky Rescue Disk 10    free    Kaspersky Rescue Disk is designed to scan, disinfect and restore infected operating systems. It should be used when it is impossible to boot the operating system.

Security Scan
   free    Kaspersky Security Scan provides a free-of-charge, easy way to find viruses and other threats that may be hidden on your PC… plus get advice on your PC’s security status.

Burp Suite

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.
Md Alamgir Kabir
Department of Software Engineering