This list is an collection of cyberwarfare and cybercrime tools. Security tools that have been collected from the internet can be found here. They all have an legit and trusty source.
The tools that criminals use are mostly the same tools that security experts use to audit their systems. This goes the same for cyberwarfare and cybercrime tools. Cyberwarfare or hacktivism tools like DDOS scripts are used by pentesting experts to pentest and audit an environment.
Security tools like Firewall Analyzers and password cracking tools are needed to create and provide secure environments. This list offers an wide range of tools: real time protection tools, portable anti virus programs, anti rootkit tools, sniffing tools and several company provided tools.
Pro-actively protect your IT infrastructure with BackBox. It is the perfect security solution; providing pen-testing, incident response, computer forensics, and intelligence gathering tools. The most current release of BackBox Linux includes the latest software solutions for vulnerability analysis/assessment and pen-testing. It is one of the lightest/fastest Linux distros available on the Internet.
Download Backbox 2013
From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created. BackTrack has grown far beyond its humble roots as a live CD and has now become a full-fledged operating system. With all this buzz, you might be asking yourself: – What’s new ?
You can find a lot of security tools on the internet. But it is hard to find the right tool for the right job. Here you will be able to download firewall analyzers and several security tools. Cyberwarzone has listed these tools for you.
If you believe we missed out on a security tool you can send us an message or simply post it as an comment.
Real time protection
Real time protection tools Avast! Free
Panda Cloud Free
Avira free antivirus Free
Microsoft Security Essentials Free
Fprot (with Returnil) Free
PC Tools Free Free
FortiClient Lite Free
Unthreat Antivirus Free
Digital Defender Free
CMC Infosec Free
Clam Sentinel Free
Moon Secure Free
Ainvo Antivirus Free
Portable anti-virus programs
Portable anti-virus programs DrWeb cureit
Emsisoft Emergency USB Stick files
Microsoft Safety Scanner
AVZ / AVZ database
Norman malware cleaner
Panda ActiveScan Cleaner
Anti Root kit
Anti Root kit TDSS Killer
Avast MBR Scanner
Bitdefender Bootkit Removal Tool
Hypersight Rootkit Detector
Security is effective when you know what is going on in your environment. The most of us protect ourselves with Firewalls, IDS, IPS and multiple monitor tools.
These devices and tools all create logfiles that can be analyzed to
Firewall Analyzers Software Free / Paid Download link
Firemon Paid http://www.firemon.com
Barracudanetworks Paid http://www.barracudanetworks.com
Splunk Paid http://www.splunk.com
If you want to monitor your environment you can use these monitor tools to find out what is happening in your environment.
Monitor tools Software FREE / Paid Download link
Zenoss Core Free http://community.zenoss.org/
NTA Monitor Free http://www.nta-monitor.com/tools/ike-scan/
Do you need to analyze an packet? You can use this packet analyzers to sniff packets that cross your network. You can analyze network problems, detect network intrusion attempts and more.
Sniffers Software Free / Paid Download link
Wireshark Free http://www.wireshark.org
Code Review Tools
Tools to review code.
Code Review Tools Software Free / Paid Download link
Rough Auditing Tool for Security Free https://www.fortify.com
Config Review Tools
Tools to review config files.
Config Review Tools Software Free / Paid Download link
Apache Benchmark Free http://www.cisecurity.org/
Microsoft Best Practice Analyzer Paid http://www.microsoft.com
Database Tools Software Free / Paid Download link
SQL Server Express Utility Free http://www.microsoft.com
MySQL Command-Line Tool Free http://dev.mysql.com/
Leviathan Free http://leviathan.sourceforge.net/
WinSQL without installer Free http://web.synametrics.com/rawfiles.htm
Debugging Tools Software Free / Paid Download link
OllyDbg Free http://www.ollydbg.de/
Forensic Tools Software Free / Paid Download link
Mandiant Red Curtain Free http://www.mandiant.com/
Mandiant Red Line Free http://www.mandiant.com/
Fuzzer Tools Software Free / Paid Download link
Skipfish Free http://code.google.com/p/skipfish/
WSFuzzer Project Free https://www.owasp.org/
FileFuzz Free http://www.securiteam.com/tools
Fuzzdb Free http://code.google.com/p/fuzzdb/
SAP Tools Software Free / Paid Download link
SAPYTO Free http://www.security-database.com/
LIVE ISO Software Free / Paid Download link
Backtrack Free http://www.backtrack-linux.org/
Hiren Free http://www.hiren.info/pages/bootcd
Great Tool resources
Other resources Software Free / Paid Download link
HackArmoury Free http://hackarmoury.com/tools
Microsoft Free http://www.microsoft.com/download/
Phenoelit Free http://phenoelit.org/fr/tools.html
techsupportalert Free Massive tools list
Kaspersky Free Tools
Kaspersky Virus Removal Tool free Virus Removal Tool is a utility designed to remove all types of infections from your computer. It implies effective algorithms of detection used by Kaspersky Anti-Virus and AVZ. It cannot substitute a resident antivirus application.http://www.kaspersky.com/antivirus-removal-tool-register
Kaspersky Rescue Disk 10 free Kaspersky Rescue Disk is designed to scan, disinfect and restore infected operating systems. It should be used when it is impossible to boot the operating system.http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/kav_rescue_10.iso
free Kaspersky Security Scan provides a free-of-charge, easy way to find viruses and other threats that may be hidden on your PC… plus get advice on your PC’s security status.http://products.kaspersky-labs.com/products/multilanguage/special/kss2/kss188.8.131.52mlg_en_ru_fr_de.exe
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.