- Spiderfoot OSINT
- Shodan
- Maltego
- TheHarvester
- Masscan
- Cewl
- OpenVAS
- Zmap
- Burp Suite
- Nikto
- SQL Map
- OWASP ZAP
- WPScan
- Nmap
- Wireshark
- Netcat
- Hydra
- Nessus
- John the Ripper
- Metasploit
- Tcpdump
- WiFite
- Aircrack-ng
- Kismet
- Scout Suite
- Pacu
- CloudSploit
- Cloud Security Suite
- AWS Security Toolkit
- GoPhish
- Social-Engineer Toolkit (SET)
- King Phisher
- Splunk
- ELK Stack (Elasticsearch, Logstash, Kibana)
- Graylog
- Grafana
- VMWare Carbon Black
- Velociraptor
- Within velociraptor, Artifact collection and deployment is super powerful.
- OSSEC
- CrowdStrike Falcon
- Corelight
- Zeek
- Wireshark
- Mr. Majestic
- Yara
- Cuckoo Sandbox
- Ghidra
- Volatility (Used for memory forensics)
- Regshot (Registry Forensics)
- Autopsy
- FTK Imager
- binwalk
- exiftool
- MISP (threat intelligence and sharing platform)
- TheHive (scalable 4-in-1 open source platform designed to make life easier for SOCs, CSIRTs, CERTs and any information security practitioner dealing with security incidents)
- Demisto
- Swimlane
- Siemplify
- QRadar
- LogRhythm
- AlienVault OSSIM
- ThreatConnect
- Anomali ThreatStream
- Recorded Future
- OpenVAS
- Nessus
- Nexpose
- Ansible
- Chef
- Puppet
- pfSense
- Snort
- Suricata
- Hashcat
- John the Ripper
- SIFT Workstation
- GRR (Google Rapid Response)
- Moloch
- Zeek (formerly Bro)