Cybersecurity Tools
Cybersecurity Tools
1️⃣ Digital Forensics Tools
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| Autopsy | Computer forensics | Analyze hard disk, recover deleted files | Investigators |
| FTK Imager | Disk imaging | Create forensic image of system | Forensic labs |
| EnCase | Advanced forensics | Evidence analysis & reporting | Expert investigators |
| Cellebrite | Mobile forensics | Extract WhatsApp, calls, SMS | Cyber police |
| Oxygen Forensics | Mobile analysis | Smartphone data extraction | Investigators |
2️⃣ Network Investigation Tools
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| Wireshark | Packet analyzer | Capture network traffic | Cyber labs |
| Tcpdump | Network capture | Monitor traffic via command line | Analysts |
| NetFlow Analyzer | Network monitoring | Detect suspicious activity | SOC teams |
3️⃣ SIEM & Log Monitoring Tools
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| Splunk | SIEM | Log monitoring & alerts | SOC teams |
| IBM QRadar | SIEM | Threat detection | Large organizations |
| Wazuh | Open-source SIEM | Log analysis & alerts | Cyber labs |
| Microsoft Sentinel | Cloud SIEM | Cloud monitoring | Enterprises |
4️⃣ Ethical Hacking / Testing Tools (Training Labs)
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| Nmap | Network scanner | Find open ports | Security testers |
| Burp Suite | Web testing | Test web vulnerabilities | Students/labs |
| Metasploit | Exploitation | Simulate attacks | Ethical hacking labs |
| OWASP ZAP | Web scanner | Detect web flaws | Training labs |
| Nikto | Web scanner | Server vulnerability scan | Security teams |
5️⃣ Malware Analysis Tools
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| VirusTotal | Malware scan | Check suspicious files | Investigators |
| Any.Run | Sandbox | Analyze malware behavior | Analysts |
| Cuckoo Sandbox | Malware lab | Study ransomware/virus | Forensic labs |
6️⃣ Password & Brute-Force Analysis Tools
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| Hashcat | Password cracking | Recover passwords | Forensics labs |
| John the Ripper | Password audit | Password strength testing | Security labs |
| Hydra | Brute force testing | Test login security | Training labs |
7️⃣ OSINT (Open Source Intelligence) Tools
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| Maltego | OSINT tool | Link analysis & tracking | Investigators |
| theHarvester | Email/IP search | Gather public data | Analysts |
| SpiderFoot | OSINT automation | Digital footprint tracking | Cyber units |
| Google Dorks | Search technique | Find exposed data | Investigators |
8️⃣ IP Tracking & Analysis Tools
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| Whois Lookup | Domain info | Owner details of domain | Investigators |
| IPinfo | IP tracking | Location & ISP details | Cyber cells |
| GeoIP tools | IP mapping | Approximate location | Police units |
9️⃣ Log Analysis Tools
| Tool Name | Type | Used For | Who Uses |
|---|---|---|---|
| ELK Stack | Log analysis | Central log monitoring | SOC teams |
| Graylog | Log management | Investigate logs | Analysts |
| Syslog tools | Log collection | Track system activity | IT teams |
