Skip to content

Top Security Tools of 2025

100 essentials across recon, web, network, AD, cloud, containers, DFIR, and C2

Recon & OSINT

Shodan

Search engine for Internet-connected devices

Recon & OSINT

Censys

Internet-wide scan data and assets search

Recon & OSINT

BinaryEdge

Exposure and threat surface intelligence

Recon & OSINT

FOFA

Global Internet assets search engine

Recon & OSINT

Amass

In-depth attack surface mapping and asset discovery

Recon & OSINT

Subfinder

Fast passively enumerating subdomains

Recon & OSINT

theHarvester

E-mail, subdomain and names harvesting

Recon & OSINT

SpiderFoot

Automated OSINT collection and analysis

Recon & OSINT

Recon-ng

Modular web reconnaissance framework

Recon & OSINT

Maltego

Graph-based link analysis for OSINT

Recon & OSINT

OSINT Framework

Directory of OSINT resources and tools

Recon & OSINT

Sherlock

Find usernames across social networks

Web App

Burp Suite

Integrated platform for web application security testing

Web App

OWASP ZAP

Open source web app scanner and proxy

Web App

Nuclei

Fast, template-based vulnerability scanner

Web App

Nikto

Web server scanner for dangerous files and misconfigs

Web App

sqlmap

Automatic SQL injection and takeover tool

Web App

ffuf

Fast web fuzzer for content discovery

Web App

dirsearch

Brute force directories and files on web servers

Web App

kiterunner

API discovery and enumeration toolkit

DFIR

Volatility

Advanced memory forensics framework

DFIR

YARA

Pattern matching for malware research and hunting

Web App

mitmproxy

Interactive HTTPS proxy for traffic inspection

Web App

Wappalyzer

Identify technologies used on websites

Web App

httpx

Fast and flexible HTTP toolkit

Web App

gau

Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl

Web App

waybackurls

Fetch archived URLs from the Wayback Machine

Network

Nmap

Network discovery and security auditing

Network

Masscan

Internet-scale port scanner

Network

Naabu

Fast port scanner

Network

ZMap

Internet-wide network scanner

Network

Wireshark

Network protocol analyzer

Network

TShark

Terminal network protocol analyzer (Wireshark CLI)

Network

Scapy

Powerful interactive packet manipulation

Network

bettercap

Swiss army knife for network attacks and monitoring

Network

tcpdump

Packet capture and analysis CLI

Network

Ncat

Modern netcat from the Nmap project

Network

hping3

Packet generator and analyzer

Wireless

Kismet

Wireless network detector and sniffer

Wireless

Aircrack-ng

WEP/WPA key cracking and wireless auditing

DFIR

Autopsy

Digital forensics platform (GUI for Sleuth Kit)

Auth & Network

Responder

LLMNR/NBT-NS/mDNS poisoner

Auth & Network

Impacket

Python collection for network protocols and attacks

Auth & Network

CrackMapExec

Swiss army knife for pentesting networks

Auth & Network

Hydra

Fast network logon cracker

Auth & Network

Medusa

Network password brute forcing

Auth & Network

Ncrack

High-speed network authentication cracking

AD & Windows

BloodHound

Graph-based AD attack path analysis

AD & Windows

SharpHound

Collector for BloodHound data

AD & Windows

mimikatz

Credential dumping and manipulation

AD & Windows

Rubeus

Kerberos abuse toolkit

AD & Windows

PowerView

PowerShell AD reconnaissance

AD & Windows

PowerUp

Windows privilege escalation checks

AD & Windows

Seatbelt

Security oriented host survey

AD & Windows

SharpUp

Windows privilege escalation checks

AD & Windows

Certify

AD CS misconfiguration abuse

AD & Windows

Coercer

Coerce machines to authenticate (e.g., printer bug)

AD & Windows

PetitPotam

NTLM relay vector via EFSRPC

AD & Windows

gMSADumper

Dump gMSA passwords

AD & Windows

Kerbrute

Kerberos pre-auth bruteforcer

AD & Windows

ADExplorer

AD viewer and editor (Sysinternals)

AD & Windows

LaZagne

Credentials recovery on Windows/Linux/macOS

AD & Windows

PingCastle

Active Directory security health assessment

C2 & Post-Ex

Metasploit Framework

Exploit development and post-exploitation framework

C2 & Post-Ex

Cobalt Strike

Commercial adversary simulation platform

C2 & Post-Ex

Sliver

Open source adversary emulation framework

C2 & Post-Ex

Mythic

Plugin-based C2 framework

C2 & Post-Ex

Havoc

Modern C2 framework

C2 & Post-Ex

Empire

Post-exploitation framework

C2 & Post-Ex

Covenant

.NET-based C2 framework

C2 & Post-Ex

Merlin

Cross-platform post-exploitation framework

C2 & Post-Ex

Evil-WinRM

WinRM shell for pentesting Windows

C2 & Post-Ex

Nishang

Offensive PowerShell scripts and payloads

Phishing & Auth

Evilginx2

Adversary-in-the-middle phishing framework

Phishing & Auth

Gophish

Open source phishing framework

Phishing & Auth

King Phisher

Phishing campaign toolkit

Phishing & Auth

Modlishka

Reverse proxy for phishing and bypassing 2FA

Phishing & Auth

MSOLSpray

Password spraying for Microsoft 365/Azure AD

Cloud & IaC

ScoutSuite

Multi-cloud security auditing

Cloud & IaC

Prowler

AWS/Azure/GCP security best practices auditing

Cloud & IaC

Pacu

AWS exploitation framework

Cloud & IaC

TruffleHog

Secrets scanning in code, configs, and logs

Cloud & IaC

Gitleaks

Protect and discover hardcoded secrets

Cloud & IaC

Checkov

Static analysis for IaC (Terraform/K8s/Cloud)

Cloud & IaC

tfsec

Static analysis for Terraform

Cloud & IaC

Semgrep

Lightweight static analysis and code rules

Cloud & IaC

KICS

Find security issues in IaC

Cloud & IaC

Snyk CLI

SAST/Dependency scanning CLI

Cloud & IaC

Terrascan

Detect compliance and security violations across IaC

Cloud & IaC

Cloudsplaining

AWS IAM risk assessment and least privilege

Cloud & IaC

Cartography

Attack surface mapping and asset graph for cloud

Containers & Vuln

Trivy

Comprehensive container and artifact scanner

Containers & Vuln

Grype

Container image vulnerability scanner

Containers & Vuln

kube-hunter

Kubernetes security assessment

Containers & Vuln

kube-bench

CIS Benchmark tests for Kubernetes

DFIR

Velociraptor

Endpoint visibility, DFIR collection and hunting

Network

Zeek

Network security monitoring (formerly Bro)

Network

Suricata

High-performance IDS/IPS and network security monitoring

Passwords

Hashcat

Advanced password recovery and cracking

Passwords

John the Ripper

Fast password cracker with many formats