TOOLBOX

Cybersecurity Tools

Discover a comprehensive collection of tools for OSINT, CTI, malware analysis, forensic investigation, and much more.

OSINT ToolsCTI ToolsMalware AnalysisForensics
Certifications
150+
Listed Tools
6
Categories
85%
Free Tools
Weekly
Updates
Tool Categories

6 Essential Categories

Explore our collection organized by domain of expertise: OSINT, CTI, Malware, Forensics, Crypto and Pentest.

OSINT Tools

Collect and analyze open-source intelligence

Explore

Popular Tools

theHarvester
Free

Email and domain gathering

Shodan
Freemium

IoT search engine

Maltego
Commercial

Link and relationship analysis

Spiderfoot
Open Source

Automated reconnaissance

Use Cases

Reconnaissance
Threat Hunting
Due Diligence
Investigation

CTI Tools

Threat Intelligence analysis and management

Explore

Popular Tools

MISP
Open Source

Threat intelligence sharing

OpenCTI
Open Source

Knowledge graph platform

TheHive
Open Source

Security incident management

Cortex
Open Source

Security analyzers

Use Cases

IOC Sharing
Incident Management
Correlation
Reporting

Malware Analysis

Tools for malware analysis and detection

Explore

Popular Tools

VirusTotal
Free

File and URL analysis

Hybrid Analysis
Freemium

Analysis sandbox

YARA
Open Source

Pattern detection

Cuckoo
Open Source

Dynamic analysis

Use Cases

Static Analysis
Dynamic Analysis
Detection
Reverse Engineering

Forensics

Forensic investigation and analysis

Explore

Popular Tools

Volatility
Open Source

Memory dump analysis

Autopsy
Open Source

Disk analysis

Sleuth Kit
Open Source

Forensic investigation

Wireshark
Open Source

Network traffic analysis

Use Cases

Incident Investigation
Post-Mortem Analysis
Legal Evidence
Timeline

Cryptography

Cryptography and encryption tools

Explore

Popular Tools

Hashcat
Open Source

Password cracking

CyberChef
Free

Data manipulation

John the Ripper
Open Source

Password auditing

OpenSSL
Open Source

Cryptographic tools

Use Cases

Cracking
Encryption
Crypto Analysis
Auditing

Pentest & Red Team

Penetration testing tools

Explore

Popular Tools

Metasploit
Open Source

Exploitation framework

Nmap
Open Source

Network scanner

Burp Suite
Freemium

Web application testing

Cobalt Strike
Commercial

Adversary simulation

Use Cases

Exploitation
Scanning
Enumeration
Post-Exploitation
Must-Have Tools

Industry Must-Haves

These tools are used daily by thousands of cybersecurity professionals.

MITRE ATT&CK Navigator

CTI

Visualize and annotate attack techniques from the MITRE ATT&CK framework

Interactive visualization
Custom annotations
Data export
Visit Website

Sigma Rules

Detection

Universal detection rules compatible with all SIEMs

Universal format
Community rules
SIEM integration
Visit Website

STIX/TAXII

Standards

Standards for automated Cyber Threat Intelligence exchange

Standardized format
Automated exchange
Interoperability
Visit Website

Want to Master These Tools?

Find the best certifications and training to become an expert.