Hackers logged into your accounts? REPORT HERE

Cyber-Forensics.co is continually testing and reviewing the best cyber security software

Please contact us if you would like us to review or add software categories or if you believe any software on our lists have been miscategorized.

Category Purpose
Ad-blocking and Content Filtering Tools Network-level ad-blocking and content filtering
Adversary Emulation Tools Simulating adversary tactics
Anti-Virus and Malware Scanners Malware detection
Blockchain Security Tools Analyzing and securing blockchain
Cloud Security Monitoring Tools Monitoring cloud environments
Cryptography Tools Cryptographic operations
Cryptographic Forensic Tools Tracing Cryptocurrencies and detecting cryptography
Dark Web Monitoring Tools Monitoring activities on the dark web
Data Encryption and Decryption Tools Encrypting and decrypting data
Data Loss Prevention (DLP) Solutions Preventing data leaks
Database Assessment Tools Detecting and exploiting SQL vulnerabilities
Database Management Systems (DBMS) Secure database management
Distributed Denial of Service (DDoS) Mitigation Tools DDoS protection
DNS Analysis Tools DNS-related assessments
Email Encryption Tools Email encryption
Email Security Tools Email authentication and security
Exploitation Frameworks Penetration testing
File Deletion and Recovery Tools Data recovery
File Integrity Monitoring (FIM) Tools Monitoring file changes
File Integrity Verification Tools Verifying file integrity
File Sharing and Collaboration Tools Assessing collaboration security
Firewall Testing Tools Testing firewall rules
Forensic Tools Digital forensics investigations
Honeypots Deploying honeypots
Incident Response Tools Incident analysis
Intrusion Detection Systems (IDS) Network intrusion detection
Intrusion Prevention Systems (IPS) Network-based intrusion prevention
IoT (Internet of Things) Device Testing Tools IoT security assessments
IoT Device Management Platforms Managing and securing IoT devices
IoT Penetration Testing Tools Assessing IoT device security
Mobile Application Security Tools Mobile security assessments
Mobile Device Management (MDM) Solutions Managing and securing mobile devices
Multi-Factor Authentication (MFA) Solutions Enhanced authentication
Network Access Control (NAC) Systems Controlling network access
Network Authentication Protocols Network authentication
Network Protocol Analyzers Packet analysis
Network Scanning Tools Discovering and mapping network hosts
Network Sniffing Tools Network sniffing
Network Topology Mapping Tools Creating network diagrams
Network Traffic Capture and Replay Tools Capturing and replaying network traffic
Network Traffic Encryption Tools Encrypting network traffic
Network Traffic Filtering Tools Controlling network traffic
Operating System for Security Testing Specialized OS for CEH
Packet Crafting Tools Crafting custom packets
Packet Sniffers Capturing and analyzing network traffic
Password Cracking Tools Password recovery
Password Management Solutions Secure password management
Port Scanners Port scanning
Proxy Bypass Tools Bypassing proxies
Proxy Servers Tunneling traffic through proxies
Red Team Collaboration Platforms Red teaming exercises
Reverse Engineering Tools Analyzing malware and binaries
Secure File Transfer Protocols Secure file transfers
Security Assessment and Compliance Tools Compliance scanning
Security Information and Event Management (SIEM) Tools Log analysis and correlation
Social Engineering Simulation Tools Phishing campaign simulations
Social Engineering Toolkit Social engineering attacks
Social Media Analysis Tools Gathering intelligence from social media
SSH and Telnet Clients Secure remote access
System Exploitation Frameworks Web browser exploits
Threat Intelligence Platforms (TIPs) Collecting and sharing threat intelligence
Traffic Analysis Tools Analyzing network traffic
Virtualization Software Setting up virtual environments
Voice Phishing (Vishing) Tools Voice-based social engineering attacks
VoIP (Voice over IP) Analysis Tools VoIP security
VoIP Penetration Testing Tools Testing VoIP systems
Vulnerability Scanners Identifying weaknesses in systems
Web Application Firewalls (WAF) Protecting web applications
Web Application Scanners Web app security testing
Web Content Management Systems (CMS) Web security testing
Web Proxy Servers Controlling and monitoring web traffic
Web Server Software Hosting web applications securely
Web Vulnerability Scanners Web app security
Windows Registry Analysis Tools Analyzing Windows registry hives
Wireless Network Auditing Tools Assessing Wi-Fi security
Zero-Day Exploit Development Tools Creating zero-day exploits