- Burp Suite
- Caido
- CredMaster
- Evilginx
- Exploit-db
- FindMeAccess
- FireProx
- Gato-X
- Gophish
- GraphRunner
- Hashcat
- Hydra
- Metasploit
- Modlishka
- MSOLSpray
- Nuclei
- OSINT
- Pacu
- ROADtools
- ScoutSuite
- Shodan
- Social-Engineer Toolkit
- Sqlmap
- Adminer
- BloodHound
- DonPAPI
- GraphRunner
- Hashcat
- Impacket
- Inveigh
- Kerbrute
- LOLBins
- Malware
- Mimikatz
- MITM6
- net use
- NetExec
- PEASS-ng
- PlumHound
- PowerShell
- PsExec
- Responder
- Rubeus
- SCCMHunter
- Seatbelt
- ServiceController
- SharpUp
- Snaffler
- Gcat
- Gost
- Havok
- Leviathan
- Mythic
- Silver
- Sneaky Creeper
- UBoatRAT
- SharpStay
- SharpPersist
- StayKit
- PsExec
- DLLHijackTest
- PowerSploit
- FaceDancer
- PersistBOF
- Impacket
- PowerShell
- Metasploit
- Kernel Driver Utility
- Havok
- Mythic
- Shim Generator
- SDB-Explorer
- Atomic Red Team
- Chromebackdoor
- Browser Exploitation Framework
- Evilginx
- CHIPSEC
- Flashrom
- Bash Bunny
- USB Rubber Ducky
- OMGCable
- AC-Hunter
- Active Defense Harbinger Distribution
- BloodHound
- CanaryTokens
- DeepBlueCLI
- EDR Tools
- Elastic Security
- ELK Stack
- espy
- Falco
- Graylog Open
- Hawk
- Hayabusa
- HoneyBadger
- Incident Response Cheat Sheets
- JPCERT Tool Analysis
- Kiwi Syslog Server
- LogonTracer
- MITRE Engage
- OpenEDR
- OpenUBA
- OSQuery
- OSSEC
- OSSIM
- Passer
- Prowler
- RITA
- ScoutSuite
- Security Onion
- Sysinternals Suite
- Velociraptor
- Volatility
- Wazuh