Cyber-Forensics.co is continually testing and reviewing the best cyber security software
Please contact us if you would like us to review or add software categories or if you believe any software on our lists have been miscategorized.
Category | Purpose |
Ad-blocking and Content Filtering Tools | Network-level ad-blocking and content filtering |
Adversary Emulation Tools | Simulating adversary tactics |
Anti-Virus and Malware Scanners | Malware detection |
Blockchain Security Tools | Analyzing and securing blockchain |
Cloud Security Monitoring Tools | Monitoring cloud environments |
Cryptography Tools | Cryptographic operations |
Cryptographic Forensic Tools | Tracing Cryptocurrencies and detecting cryptography |
Dark Web Monitoring Tools | Monitoring activities on the dark web |
Data Encryption and Decryption Tools | Encrypting and decrypting data |
Data Loss Prevention (DLP) Solutions | Preventing data leaks |
Database Assessment Tools | Detecting and exploiting SQL vulnerabilities |
Database Management Systems (DBMS) | Secure database management |
Distributed Denial of Service (DDoS) Mitigation Tools | DDoS protection |
DNS Analysis Tools | DNS-related assessments |
Email Encryption Tools | Email encryption |
Email Security Tools | Email authentication and security |
Exploitation Frameworks | Penetration testing |
File Deletion and Recovery Tools | Data recovery |
File Integrity Monitoring (FIM) Tools | Monitoring file changes |
File Integrity Verification Tools | Verifying file integrity |
File Sharing and Collaboration Tools | Assessing collaboration security |
Firewall Testing Tools | Testing firewall rules |
Forensic Tools | Digital forensics investigations |
Honeypots | Deploying honeypots |
Incident Response Tools | Incident analysis |
Intrusion Detection Systems (IDS) | Network intrusion detection |
Intrusion Prevention Systems (IPS) | Network-based intrusion prevention |
IoT (Internet of Things) Device Testing Tools | IoT security assessments |
IoT Device Management Platforms | Managing and securing IoT devices |
IoT Penetration Testing Tools | Assessing IoT device security |
Mobile Application Security Tools | Mobile security assessments |
Mobile Device Management (MDM) Solutions | Managing and securing mobile devices |
Multi-Factor Authentication (MFA) Solutions | Enhanced authentication |
Network Access Control (NAC) Systems | Controlling network access |
Network Authentication Protocols | Network authentication |
Network Protocol Analyzers | Packet analysis |
Network Scanning Tools | Discovering and mapping network hosts |
Network Sniffing Tools | Network sniffing |
Network Topology Mapping Tools | Creating network diagrams |
Network Traffic Capture and Replay Tools | Capturing and replaying network traffic |
Network Traffic Encryption Tools | Encrypting network traffic |
Network Traffic Filtering Tools | Controlling network traffic |
Operating System for Security Testing | Specialized OS for CEH |
Packet Crafting Tools | Crafting custom packets |
Packet Sniffers | Capturing and analyzing network traffic |
Password Cracking Tools | Password recovery |
Password Management Solutions | Secure password management |
Port Scanners | Port scanning |
Proxy Bypass Tools | Bypassing proxies |
Proxy Servers | Tunneling traffic through proxies |
Red Team Collaboration Platforms | Red teaming exercises |
Reverse Engineering Tools | Analyzing malware and binaries |
Secure File Transfer Protocols | Secure file transfers |
Security Assessment and Compliance Tools | Compliance scanning |
Security Information and Event Management (SIEM) Tools | Log analysis and correlation |
Social Engineering Simulation Tools | Phishing campaign simulations |
Social Engineering Toolkit | Social engineering attacks |
Social Media Analysis Tools | Gathering intelligence from social media |
SSH and Telnet Clients | Secure remote access |
System Exploitation Frameworks | Web browser exploits |
Threat Intelligence Platforms (TIPs) | Collecting and sharing threat intelligence |
Traffic Analysis Tools | Analyzing network traffic |
Virtualization Software | Setting up virtual environments |
Voice Phishing (Vishing) Tools | Voice-based social engineering attacks |
VoIP (Voice over IP) Analysis Tools | VoIP security |
VoIP Penetration Testing Tools | Testing VoIP systems |
Vulnerability Scanners | Identifying weaknesses in systems |
Web Application Firewalls (WAF) | Protecting web applications |
Web Application Scanners | Web app security testing |
Web Content Management Systems (CMS) | Web security testing |
Web Proxy Servers | Controlling and monitoring web traffic |
Web Server Software | Hosting web applications securely |
Web Vulnerability Scanners | Web app security |
Windows Registry Analysis Tools | Analyzing Windows registry hives |
Wireless Network Auditing Tools | Assessing Wi-Fi security |
Zero-Day Exploit Development Tools | Creating zero-day exploits |