Cyber segurança, lista completa de ferramentas.

Cada dia estão sendo desenvolvidas novas ferramentas de segurança cibernética e para acompanhar todas essas ferramentas, você pode usar essa enorme lista de ferramentas de segurança cibernética. As ferramentas de segurança cibernética que estão listadas aqui foram coletadas da web, o que significa que todas elas têm seus próprios mantenedores e desenvolvedores. Algumas das ferramentas que você encontrará na lista são ferramentas premium, enquanto outras são gratuitas.

cyber segurança aiconsultoria

Outro ponto interessante é o fato de que ambientes como o Github.com contenham milhares de ferramentas interessantes de cibersegurança que precisam ser descobertas. Nós tentamos o nosso melhor para listar todas as ferramentas nesta enorme lista.

Ferramentas de coleta de informações

Name Free Trial Paid Windows Linux macOS Genre
acccheck x x Information gathering
ace-voip x x Information gathering
Amap x x Information gathering
arp-scan x x Information gathering
Automater x x Information gathering
bing-ip2hosts x x Information gathering
braa x x Information gathering
CaseFile x x Information gathering
CDPSnarf x x Information gathering
cisco-torch x x Information gathering
Cookie Cadger x x Information gathering
copy-router-config x x Information gathering
DMitry x x Information gathering
dnmap x x Information gathering
dnsenum x x Information gathering
dnsmap x x Information gathering
DNSRecon x x Information gathering
dnstracer x x Information gathering
dnswalk x x Information gathering
DotDotPwn x x Information gathering
enum4linux x x Information gathering
enumIAX x x Information gathering
EyeWitness x x Information gathering
Faraday x x Information gathering
Fierce x x Information gathering
Firewalk x x Information gathering
fragroute x x Information gathering
fragrouter x x Information gathering
Ghost Phisher x x Information gathering
GoLismero x x Information gathering
goofile x x Information gathering
hping3 x x Information gathering
ident-user-enum x x Information gathering
InSpy x x Information gathering
InTrace x x Information gathering
iSMTP x x Information gathering
lbd x x Information gathering
Maltego Teeth x x Information gathering
masscan x x Information gathering
Metagoofil x x Information gathering
Miranda x x Information gathering
nbtscan-unixwiz x x Information gathering
Nmap x x Information gathering
ntop x x Information gathering
OSRFramework x x Information gathering
p0f x x Information gathering
Parsero x x Information gathering
Recon-ng x x Information gathering
SET x x Information gathering
SMBMap x x Information gathering
smtp-user-enum x x Information gathering
snmp-check x x Information gathering
SPARTA x x Information gathering
sslcaudit x x Information gathering
SSLsplit x x Information gathering
sslstrip x x Information gathering
SSLyze x x Information gathering
Sublist3r x x Information gathering
THC-IPV6 x x Information gathering
theHarvester x x Information gathering
TLSSLed x x Information gathering
twofi x x Information gathering
URLCrazy x x Information gathering
Wireshark x x Information gathering
WOL-E x x Information gathering
Xplico x x Information gathering

Ferramentas de Passwords

Name Free Trial Paid Windows Linux macOS Genre
John the Tipper
Hash suite x x x Passwords
acccheck x x Passwords
BruteSpray x x Passwords
Burp Suite x x Passwords
CeWL x x Passwords
chntpw x x Passwords
cisco-auditing-tool x x Passwords
CmosPwd x x Passwords
creddump x x Passwords
crowbar x x Passwords
crunch x x Passwords
DBPwAudit x x Passwords
findmyhash x x Passwords
gpp-decrypt x x Passwords
hash-identifier x x Passwords
Hashcat x x Passwords
HexorBase x x Passwords
THC-Hydra x x Passwords
John the Ripper x x Passwords
Johnny x x Passwords
keimpx x x Passwords
Maltego Teeth x x Passwords
Maskprocessor x x Passwords
multiforcer x x Passwords
Ncrack x x Passwords
oclgausscrack x x Passwords
ophcrack x x Passwords
PACK x x Passwords
patator x x Passwords
phrasendrescher x x Passwords
polenum x x Passwords
RainbowCrack x x Passwords
rcracki-mt x x Passwords
RSMangler x x Passwords
SQLdict x x Passwords
Statsprocessor x x Passwords
THC-pptp-bruter x x Passwords
TrueCrack x x Passwords
WebScarab x x Passwords
wordlists x x Passwords
zaproxy x x Passwords

Ferramentas de Engenharia reversa

Name Free Trial Paid Windows Linux macOS Genre
apktool x x Reverse Engineering
dex2jar x x Reverse Engineering
diStorm3 x x Reverse Engineering
edb-debugger x x Reverse Engineering
jad x x Reverse Engineering
javasnoop x x Reverse Engineering
JD-GUI x x Reverse Engineering
OllyDbg x x Reverse Engineering
smali x x Reverse Engineering
Valgrind x x Reverse Engineering
YARA x x Reverse Engineering

Ferramentas de Sniffing and Spoofing

Name Free Trial Paid Windows Linux macOS Genre
Burp Suite x x Sniffing & Spoofing
DNSChef x x Sniffing & Spoofing
fiked x x Sniffing & Spoofing
hamster-sidejack x x Sniffing & Spoofing
HexInject x x Sniffing & Spoofing
iaxflood x x Sniffing & Spoofing
inviteflood x x Sniffing & Spoofing
iSMTP x x Sniffing & Spoofing
isr-evilgrade x x Sniffing & Spoofing
mitmproxy x x Sniffing & Spoofing
ohrwurm x x Sniffing & Spoofing
protos-sip x x Sniffing & Spoofing
rebind x x Sniffing & Spoofing
responder x x Sniffing & Spoofing
rtpbreak x x Sniffing & Spoofing
rtpinsertsound x x Sniffing & Spoofing
rtpmixsound x x Sniffing & Spoofing
sctpscan x x Sniffing & Spoofing
SIPArmyKnife x x Sniffing & Spoofing
SIPp x x Sniffing & Spoofing
SIPVicious x x Sniffing & Spoofing
SniffJoke x x Sniffing & Spoofing
SSLsplit x x Sniffing & Spoofing
sslstrip x x Sniffing & Spoofing
THC-IPV6 x x Sniffing & Spoofing
VoIPHopper x x Sniffing & Spoofing
WebScarab x x Sniffing & Spoofing
Wifi Honey x x Sniffing & Spoofing
Wireshark x x Sniffing & Spoofing
xspy x x Sniffing & Spoofing
Yersinia x x Sniffing & Spoofing
zaproxy x x Sniffing & Spoofing

Ferramentas de teste de Stress

Name Free Trial Paid Windows Linux macOS Genre
DHCPig x x Stress Testing
FunkLoad x x Stress Testing
iaxflood x x Stress Testing
Inundator x x Stress Testing
inviteflood x x Stress Testing
ipv6-toolkit x x Stress Testing
mdk3 x x Stress Testing
Reaver x x Stress Testing
rtpflood x x Stress Testing
SlowHTTPTest x x Stress Testing
t50 x x Stress Testing
Termineter x x Stress Testing
THC-IPV6 x x Stress Testing
THC-SSL-DOS x x Stress Testing

Ferramentas de Análise de vulnerabilidade

Name Free Trial Paid Windows Linux macOS Genre
BBQSQL x x Vulnerability Analysis
BED x x Vulnerability Analysis
cisco-auditing-tool x x Vulnerability Analysis
cisco-global-exploiter x x Vulnerability Analysis
cisco-ocs x x Vulnerability Analysis
cisco-torch x x Vulnerability Analysis
copy-router-config x x Vulnerability Analysis
DBPwAudit x x Vulnerability Analysis
Doona x x Vulnerability Analysis
DotDotPwn x x Vulnerability Analysis
HexorBase x x Vulnerability Analysis
Inguma x x Vulnerability Analysis
jSQL x x Vulnerability Analysis
Lynis x x Vulnerability Analysis
Nmap x x Vulnerability Analysis
ohrwurm x x Vulnerability Analysis
openvas x x Vulnerability Analysis
Oscanner x x Vulnerability Analysis
Powerfuzzer x x Vulnerability Analysis
sfuzz x x Vulnerability Analysis
SidGuesser x x Vulnerability Analysis
SIPArmyKnife x x Vulnerability Analysis
sqlmap x x Vulnerability Analysis
Sqlninja x x Vulnerability Analysis
sqlsus x x Vulnerability Analysis
THC-IPV6 x x Vulnerability Analysis
tnscmd10g x x Vulnerability Analysis
unix-privesc-check x x Vulnerability Analysis
Yersinia x x Vulnerability Analysis

Ferramentas de Wireless

Name Free Trial Paid Windows Linux macOS Genre
Airbase-ng x x Wireless Attacks
Aircrack-ng x x Wireless Attacks
Airdecap-ng and Airdecloak-ng x x Wireless Attacks
Aireplay-ng x x Wireless Attacks
Airmon-ng x x Wireless Attacks
Airodump-ng x x Wireless Attacks
airodump-ng-oui-update x x Wireless Attacks
Airolib-ng x x Wireless Attacks
Airserv-ng x x Wireless Attacks
Airtun-ng x x Wireless Attacks
Asleap x x Wireless Attacks
Besside-ng x x Wireless Attacks
Bluelog x x Wireless Attacks
BlueMaho x x Wireless Attacks
Bluepot x x Wireless Attacks
BlueRanger x x Wireless Attacks
Bluesnarfer x x Wireless Attacks
Bully x x Wireless Attacks
coWPAtty x x Wireless Attacks
crackle x x Wireless Attacks
eapmd5pass x x Wireless Attacks
Easside-ng x x Wireless Attacks
Fern Wifi Cracker x x Wireless Attacks
FreeRADIUS-WPE x x Wireless Attacks
Ghost Phisher x x Wireless Attacks
GISKismet x x Wireless Attacks
Gqrx x x Wireless Attacks
gr-scan x x Wireless Attacks
hostapd-wpe x x Wireless Attacks
ivstools x x Wireless Attacks
kalibrate-rtl x x Wireless Attacks
KillerBee x x Wireless Attacks
Kismet x x Wireless Attacks
makeivs-ng x x Wireless Attacks
mdk3 x x Wireless Attacks
mfcuk x x Wireless Attacks
mfoc x x Wireless Attacks
mfterm x x Wireless Attacks
Multimon-NG x x Wireless Attacks
Packetforge-ng x x Wireless Attacks
PixieWPS x x Wireless Attacks
Pyrit x x Wireless Attacks
Reaver x x Wireless Attacks
redfang x x Wireless Attacks
RTLSDR Scanner x x Wireless Attacks
Spooftooph x x Wireless Attacks
Tkiptun-ng x x Wireless Attacks
Wesside-ng x x Wireless Attacks
Wifi Honey x x Wireless Attacks
wifiphisher x x Wireless Attacks
Wifitap x x Wireless Attacks
Wifite x x Wireless Attacks
wpaclean x x Wireless Attacks

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair /  Alterar )

Foto do Google

Você está comentando utilizando sua conta Google. Sair /  Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair /  Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair /  Alterar )

Conectando a %s