Skip to content

Tools Directory

Comprehensive directory of development tools, software, and resources for developers

Welcome to the ultimate tools directory for developers! This comprehensive collection includes everything from code editors and IDEs to deployment platforms and productivity tools. Each tool includes a description, key features, and installation instructions.

Code Editors & IDEs

Visual Studio Code

Free, extensible code editor by Microsoft

Visual Studio Code is a lightweight but powerful source code editor that runs on Windows, macOS, and Linux. It comes with built-in support for JavaScript, TypeScript, and Node.js and has a rich ecosystem of extensions.

Key Features:

  • IntelliSense code completion
  • Built-in Git integration
  • Extensive extension marketplace
  • Integrated terminal
  • Debugging support
  • Live Share collaboration

Installation:

IntelliJ IDEA

Powerful Java IDE with multi-language support

IntelliJ IDEA is a Java integrated development environment (IDE) for developing computer software. It's developed by JetBrains and is available as an Apache 2 Licensed community edition and a commercial edition.

Key Features:

  • Smart code completion
  • Built-in version control
  • Database tools
  • Application server integration
  • Maven and Gradle support
  • Refactoring tools

Installation:

Android Studio

Official IDE for Android app development

Android Studio is the official integrated development environment for Google's Android operating system, built on JetBrains' IntelliJ IDEA software and designed specifically for Android development.

Key Features:

  • Android-specific code completion
  • Visual layout editor
  • APK analyzer
  • Built-in emulator
  • Gradle build system
  • Gemini AI assistance

Installation:

PyCharm

The only Python IDE you need

PyCharm is an integrated development environment used for programming in Python. It provides code analysis, a graphical debugger, an integrated unit tester, integration with version control systems, and supports web development with Django.

Key Features:

  • Intelligent Python assistance
  • Web development frameworks
  • Scientific tools integration
  • Cross-technology development
  • Remote development capabilities
  • Database tools

Installation:

CLion

Cross-platform IDE for C and C++

CLion is a cross-platform IDE for C and C++ development that includes modern C++ support, libc++ and Boost, and supports CMake, Google Test, Catch, and other tools.

Key Features:

  • Smart C/C++ editor
  • Embedded terminal
  • CMake support
  • Debugger and dynamic analysis tools
  • Unit testing integration
  • VCS integration

Installation:

WebStorm

The smartest JavaScript IDE

WebStorm is an integrated development environment for JavaScript and related technologies. Like other JetBrains IDEs, it makes your development experience more enjoyable, automating routine work and helping you handle complex tasks with ease.

Key Features:

  • Intelligent coding assistance
  • Built-in developer tools
  • Debugging and testing
  • Seamless tool integration
  • VCS integration
  • Local history

Installation:

Xcode

Apple's IDE for macOS and iOS development

Xcode is Apple's integrated development environment for macOS, used to develop software for macOS, iOS, iPadOS, watchOS, and tvOS.

Key Features:

  • Interface Builder
  • iOS Simulator
  • Instruments performance analysis
  • Source control integration
  • Asset catalog
  • Swift and Objective-C support

Installation:

Cursor

The AI Code Editor

Cursor is an AI-powered code editor that lets you write code using instructions. It's designed to make you extraordinarily productive with AI assistance built into every aspect of coding.

Key Features:

  • AI-powered code completion
  • Natural language code generation
  • Intelligent refactoring
  • Context-aware suggestions
  • Multi-language support
  • VS Code compatibility

Installation:

Zed

Code at the speed of thought

Zed is a next-generation code editor designed for high-performance collaboration with humans and AI. Built by the creators of Atom and Tree-sitter.

Key Features:

  • High-performance editing
  • Multiplayer collaboration
  • AI integration
  • Language server protocol
  • Git integration
  • Extensible architecture

Installation:

Visual Studio

Microsoft's flagship IDE

Visual Studio is an integrated development environment from Microsoft. It is used to develop computer programs, as well as websites, web apps, web services and mobile apps.

Key Features:

  • IntelliSense code completion
  • Debugging and diagnostics
  • Testing tools
  • Version control integration
  • Azure integration
  • Extensions marketplace

Installation:

DataGrip

Database IDE by JetBrains

DataGrip is a database IDE that is tailored to suit the specific needs of professional SQL developers and provides a productive environment for database development.

Key Features:

  • Intelligent query console
  • Efficient schema navigation
  • Explain plan visualization
  • Smart code completion
  • Version control integration
  • Data export/import

Installation:

PhpStorm

PHP IDE by JetBrains

PhpStorm is a commercial, cross-platform IDE for PHP built by JetBrains. It provides an editor for PHP, HTML and JavaScript with on-the-fly code analysis, error prevention and automated refactorings.

Key Features:

  • Smart PHP code editor
  • Frontend technologies support
  • Built-in developer tools
  • Debugging and testing
  • Database tools
  • Framework support

Installation:

Rider

.NET IDE by JetBrains

Rider is a cross-platform .NET IDE based on the IntelliJ platform and ReSharper. It supports .NET Framework, .NET Core, and Mono-based projects.

Key Features:

  • Rich code editor
  • Powerful debugger
  • Built-in version control
  • Unit testing support
  • Database tools
  • Decompiler integration

Installation:

RubyMine

Ruby and Rails IDE by JetBrains

RubyMine is an integrated development environment that helps you be more productive in every aspect of Ruby development – from writing and debugging code to testing and deploying a completed application.

Key Features:

  • Smart code editor
  • Ruby and Rails support
  • Web development tools
  • Testing framework integration
  • Version control integration
  • Database tools

Installation:

GoLand

Go IDE by JetBrains

GoLand is a cross-platform IDE built specifically for the Go programming language. It provides all the essential features for Go development and integrates with the Go toolchain.

Key Features:

  • Smart code completion
  • Built-in debugger
  • Testing framework integration
  • Version control integration
  • Database tools
  • Go modules support

Installation:

Windsurf

Modern code editor

Windsurf is a modern, fast, and extensible code editor designed for contemporary development workflows with built-in collaboration features.

Key Features:

  • Modern interface design
  • Fast performance
  • Extensible architecture
  • Collaboration tools
  • Multi-language support
  • Integrated terminal

Installation:

  • GitHub Repository: Available through official channels
  • Platform Support: Windows, macOS, Linux
  • Documentation: View Windsurf Cheatsheet

Sublime Text

Sophisticated text editor for code, markup and prose

Sublime Text is a proprietary cross-platform source code editor with a Python application programming interface. It natively supports many programming languages and markup languages.

Key Features:

  • Multiple selections
  • Command palette
  • Powerful API
  • Package ecosystem
  • Cross platform
  • Goto anything

Installation:

Version Control

Git

Distributed version control system

Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.

Key Features:

  • Distributed development
  • Branching and merging
  • Lightweight and fast
  • Data integrity
  • Staging area
  • Free and open source

Installation:

GitHub Desktop

GUI application for Git and GitHub

GitHub Desktop is a seamless way to contribute to projects on GitHub and GitHub Enterprise. It provides an intuitive interface for Git operations.

Key Features:

  • Visual diff tools
  • Branch management
  • Commit history visualization
  • Pull request integration
  • Conflict resolution
  • Repository cloning

Installation:

  • Windows/macOS: Download from desktop.github.com
  • Package Managers:
    • Windows: winget install GitHub.GitHubDesktop
    • macOS: brew install --cask github

Terminals & Shells

Windows Terminal

Modern terminal application for Windows

Windows Terminal is a modern, fast, efficient, powerful, and productive terminal application for users of command-line tools and shells like Command Prompt, PowerShell, and WSL.

Key Features:

  • Multiple tabs and panes
  • GPU accelerated text rendering
  • Rich text and emoji support
  • Custom themes and styling
  • Configurable actions and key bindings
  • Unicode and UTF-8 character support

Installation:

iTerm2

Terminal emulator for macOS

iTerm2 is a replacement for Terminal and the successor to iTerm. It works on Macs with macOS 10.14 or newer and brings the terminal into the modern age with features you never knew you always wanted.

Key Features:

  • Split panes
  • Hotkey window
  • Search functionality
  • Autocomplete
  • Paste history
  • Instant replay

Installation:

Alacritty

GPU-accelerated terminal emulator

Alacritty is a modern terminal emulator that comes with sensible defaults, but allows for extensive configuration. By integrating with other applications, rather than reimplementing their functionality, it manages to provide a flexible set of features with high performance.

Key Features:

  • GPU acceleration
  • Cross-platform support
  • Vi mode
  • Configurable
  • Fast scrolling
  • Minimal resource usage

Installation:

GNOME Terminal

Default terminal emulator for GNOME

GNOME Terminal is a terminal emulator for the GNOME desktop environment written by Havoc Pennington and others. It supports multiple tabs and profiles.

Key Features:

  • Multiple tabs
  • Profile management
  • Transparency support
  • Custom color schemes
  • Keyboard shortcuts
  • Search functionality

Installation:

Ghostty

Modern terminal emulator

Ghostty is a fast, feature-rich terminal emulator that uses platform-native UI and GPU acceleration. It's designed to be both powerful and easy to use.

Key Features:

  • GPU acceleration
  • Platform-native UI
  • Fast performance
  • Modern features
  • Cross-platform support
  • Configurable interface

Installation:

Xterm

Standard terminal emulator for X Window System

Xterm is the standard terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that cannot use the window system directly.

Key Features:

  • VT102 compatibility
  • Tektronix 4014 support
  • Configurable
  • Lightweight
  • Standard compliance
  • Long history and stability

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install xterm
    • Fedora: sudo dnf install xterm
    • Arch: sudo pacman -S xterm
  • Platform Support: Linux/Unix with X11
  • Documentation: View Xterm Cheatsheet

Mac Terminal

Default terminal application for macOS

Terminal is the default terminal emulator included with macOS. It provides a command-line interface to the Unix shell and allows users to interact with the operating system through text commands.

Key Features:

  • Multiple tabs and windows
  • Profile customization
  • AppleScript support
  • Secure keyboard entry
  • Full-screen mode
  • Search functionality

Installation:

  • Built-in: Pre-installed with macOS
  • Location: Applications > Utilities > Terminal
  • Platform Support: macOS only
  • Documentation: View Mac Terminal Cheatsheet

Bash

Bourne Again Shell

Bash is a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. It has been used as the default login shell for most Linux distributions.

Key Features:

  • Command-line editing
  • Job control
  • Shell functions and aliases
  • Command history
  • Filename completion
  • Variable arrays

Installation:

Zsh

Z Shell

Zsh is a shell designed for interactive use, although it is also a powerful scripting language. Many of the useful features of bash, ksh, and tcsh were incorporated into zsh; many original features were added.

Key Features:

  • Advanced tab completion
  • Spelling correction
  • Theme and plugin support
  • Powerful globbing
  • Shared command history
  • Programmable completion

Installation:

  • Official Website: https://www.zsh.org/
  • Package Managers:
    • Ubuntu/Debian: sudo apt install zsh
    • macOS: brew install zsh (pre-installed on newer versions)
    • Fedora: sudo dnf install zsh
  • Documentation: View Zsh Cheatsheet

Fish

Friendly Interactive Shell

Fish is a smart and user-friendly command line shell for Linux, macOS, and the rest of the family. Fish includes features like syntax highlighting, autosuggestions, and tab completions that just work.

Key Features:

  • Syntax highlighting
  • Autosuggestions
  • Tab completions
  • Web-based configuration
  • Scripting language
  • No configuration required

Installation:

C Shell (csh)

C-like shell

The C shell is a Unix shell created by Bill Joy while he was a graduate student at University of California, Berkeley in the late 1970s. It has been widely distributed, beginning with the 2BSD release of the Berkeley Software Distribution.

Key Features:

  • C-like syntax
  • Command history
  • Job control
  • Aliases
  • Variable substitution
  • Expression evaluation

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install csh
    • Fedora: sudo dnf install tcsh (enhanced C shell)
    • macOS: Usually pre-installed
  • Documentation: View C Shell Cheatsheet

Korn Shell (ksh)

Korn Shell

The Korn shell is a Unix shell which was developed by David Korn at Bell Labs in the early 1980s and announced at USENIX on July 14, 1983. It is backward-compatible with the Bourne shell and includes many features of the C shell.

Key Features:

  • Bourne shell compatibility
  • Command-line editing
  • Job control
  • Arrays
  • Functions
  • Arithmetic expressions

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install ksh
    • Fedora: sudo dnf install ksh
    • macOS: brew install ksh
  • Documentation: View Korn Shell Cheatsheet

POSIX Shell (sh)

POSIX-compliant shell

The POSIX shell is a command-line interpreter that follows the POSIX standard. It provides a standardized interface for Unix-like operating systems and ensures portability across different systems.

Key Features:

  • POSIX compliance
  • Portability
  • Basic scripting capabilities
  • Standard command set
  • Minimal resource usage
  • Universal availability

Installation:

  • Built-in: Available on all Unix-like systems
  • Location: Usually /bin/sh
  • Platform Support: All Unix-like systems
  • Documentation: View POSIX Shell Cheatsheet

💻 Development Tools

API Development & Testing

Postman

API development and testing platform

Postman is a collaboration platform for API development. It simplifies each step of building an API and streamlines collaboration so you can create better APIs faster.

Key Features:

  • Request building and testing
  • Collection organization
  • Environment variables
  • Automated testing
  • Mock servers
  • API documentation

Installation:

  • All Platforms: Download from postman.com
  • Package Managers:
    • Windows: winget install Postman.Postman
    • macOS: brew install --cask postman
    • Linux: sudo snap install postman

Insomnia

REST and GraphQL API client

Insomnia is a powerful REST API client with cookie management, environment variables, code generation, and authentication for Mac, Windows, and Linux.

Key Features:

  • GraphQL support
  • Environment management
  • Code generation
  • Plugin system
  • Team collaboration
  • Request chaining

Installation:

  • All Platforms: Download from insomnia.rest
  • Package Managers:
    • Windows: winget install Insomnia.Insomnia
    • macOS: brew install --cask insomnia
    • Linux: sudo snap install insomnia

Containerization

Docker

Container platform for building, sharing, and running applications

Docker is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers.

Key Features:

  • Application containerization
  • Image management
  • Container orchestration
  • Multi-platform support
  • Registry integration
  • Development environment consistency

Installation:

Docker Desktop

GUI application for Docker

Docker Desktop is an easy-to-install application that enables you to build and share containerized applications and microservices.

Key Features:

  • Visual container management
  • Kubernetes integration
  • Volume management
  • Network configuration
  • Extension marketplace
  • Resource monitoring

Installation:

Programming Languages & Compilers

Python

High-level programming language

Python is an interpreted, high-level and general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant whitespace.

Key Features:

  • Easy to learn and use
  • Extensive standard library
  • Cross-platform compatibility
  • Large ecosystem of packages
  • Multiple programming paradigms
  • Strong community support

Installation:

JavaScript

Programming language of the web

JavaScript is a programming language that conforms to the ECMAScript specification. JavaScript is high-level, often just-in-time compiled, and multi-paradigm.

Key Features:

  • Dynamic typing
  • First-class functions
  • Prototype-based object-orientation
  • Event-driven programming
  • Asynchronous programming
  • Extensive ecosystem (npm)

Installation:

GCC

GNU Compiler Collection

GCC is a compiler system produced by the GNU Project supporting various programming languages. GCC is a key component of the GNU toolchain and the standard compiler for most projects related to GNU and Linux.

Key Features:

  • Multiple language support (C, C++, Fortran, etc.)
  • Cross-platform compilation
  • Optimization capabilities
  • Standards compliance
  • Extensive target architecture support
  • Free and open source

Installation:

  • Official Website: https://gcc.gnu.org/
  • Package Managers:
    • Ubuntu/Debian: sudo apt install gcc
    • Fedora: sudo dnf install gcc
    • macOS: brew install gcc
    • Windows: Available via MinGW or WSL
  • Documentation: View GCC Cheatsheet

Clang

C language family frontend for LLVM

Clang is a compiler front end for the C, C++, Objective-C, and Objective-C++ programming languages, as well as the OpenMP, OpenCL, RenderScript, CUDA, and HIP frameworks.

Key Features:

  • Fast compilation
  • Excellent diagnostics
  • Static analysis
  • Cross-platform support
  • LLVM backend
  • Standards compliance

Installation:

ARM Assembly

Assembly language for ARM processors

ARM assembly language is a low-level programming language for ARM processors. It provides direct control over the processor and is used for system programming, embedded development, and performance-critical applications.

Key Features:

  • Direct hardware control
  • Minimal overhead
  • Precise timing control
  • Embedded systems programming
  • Performance optimization
  • Hardware-specific instructions

Installation:

  • Assembler: Part of ARM development tools
  • Cross-compilation: Available via GCC ARM toolchain
  • Simulators: QEMU, ARM Development Studio
  • Documentation: View ARM Assembly Cheatsheet

AArch64 Assembly

Assembly language for 64-bit ARM processors

AArch64 is the 64-bit execution state of the ARM architecture. AArch64 assembly provides access to the full 64-bit instruction set and register file of modern ARM processors.

Key Features:

  • 64-bit instruction set
  • Large register file
  • Advanced SIMD instructions
  • Cryptographic extensions
  • Virtualization support
  • Performance optimization

Installation:

  • Toolchain: ARM64 GCC toolchain
  • Cross-compilation: Available via standard distributions
  • Simulators: QEMU, ARM Fast Models
  • Documentation: View AArch64 Assembly Cheatsheet

MIPS Assembly

Assembly language for MIPS processors

MIPS assembly language is used to program MIPS processors, which are commonly used in embedded systems, routers, and educational settings for teaching computer architecture.

Key Features:

  • RISC architecture
  • Load/store operations
  • Pipeline-friendly design
  • Educational value
  • Embedded systems use
  • Simple instruction set

Installation:

  • Toolchain: MIPS GCC cross-compiler
  • Simulators: SPIM, MARS, QtSpim
  • Package Managers:
    • Ubuntu/Debian: sudo apt install gcc-mips-linux-gnu
  • Documentation: View MIPS Assembly Cheatsheet

RISC-V Assembly

Assembly language for RISC-V processors

RISC-V is an open standard instruction set architecture based on established reduced instruction set computer principles. RISC-V assembly provides access to this modern, extensible architecture.

Key Features:

  • Open source ISA
  • Modular design
  • Extensible architecture
  • Academic and commercial use
  • Multiple privilege levels
  • Vector extensions

Installation:

  • Toolchain: RISC-V GNU toolchain
  • Simulators: Spike, QEMU
  • Package Managers:
    • Ubuntu/Debian: sudo apt install gcc-riscv64-linux-gnu
  • Documentation: View RISC-V Assembly Cheatsheet

x86 Assembly

Assembly language for x86 processors

x86 assembly language is used to program x86 processors. It provides direct access to the processor's instruction set and is used for system programming, reverse engineering, and performance optimization.

Key Features:

  • Complex instruction set
  • Variable-length instructions
  • Multiple addressing modes
  • Backward compatibility
  • Extensive instruction set
  • Wide platform support

Installation:

  • Assemblers: NASM, MASM, GAS
  • Package Managers:
    • Ubuntu/Debian: sudo apt install nasm
    • Windows: MASM (Visual Studio)
    • macOS: brew install nasm
  • Documentation: View x86 Assembly Cheatsheet

x86-64 Assembly

Assembly language for 64-bit x86 processors

x86-64 assembly language extends x86 assembly to 64-bit processors, providing access to additional registers, addressing modes, and instructions available in 64-bit mode.

Key Features:

  • 64-bit addressing
  • Additional registers
  • RIP-relative addressing
  • System call interface
  • Performance optimization
  • Modern instruction extensions

Installation:

  • Assemblers: NASM, GAS, YASM
  • Package Managers:
    • Ubuntu/Debian: sudo apt install nasm
    • Windows: MASM64 (Visual Studio)
    • macOS: brew install nasm
  • Documentation: View x86-64 Assembly Cheatsheet

🎨 Design & UI/UX Tools

Design Platforms

Figma

Collaborative design platform

Figma is a vector graphics editor and prototyping tool which is primarily web-based, with additional offline features enabled by desktop applications.

Key Features:

  • Real-time collaboration
  • Vector editing tools
  • Prototyping capabilities
  • Component systems
  • Design systems
  • Developer handoff

Installation:

  • Web: Access at figma.com
  • Desktop Apps:
    • Windows/macOS: Download from figma.com/downloads
    • Package Managers:
      • Windows: winget install Figma.Figma
      • macOS: brew install --cask figma

Sketch

macOS design tool for digital products

Sketch is a vector graphics editor for macOS developed by the Dutch company Bohemian Coding. It was first released in 2010 and won an Apple Design Award in 2012.

Key Features:

  • Vector editing
  • Symbol libraries
  • Artboard management
  • Plugin ecosystem
  • Prototyping
  • Design handoff

Installation:

  • macOS Only: Download from sketch.com
  • Package Manager: brew install --cask sketch
  • Note: Requires macOS 10.15 or later

Image Editing

GIMP

Free and open-source image editor

GIMP (GNU Image Manipulation Program) is a free and open-source raster graphics editor used for image manipulation and image editing, free-form drawing, transcoding between different image file formats, and more specialized tasks.

Key Features:

  • Photo retouching
  • Hardware support
  • File format support
  • Customizable interface
  • Plugin system
  • Scripting capabilities

Installation:

  • All Platforms: Download from gimp.org
  • Package Managers:
    • Windows: winget install GIMP.GIMP
    • macOS: brew install --cask gimp
    • Linux: sudo apt install gimp (Ubuntu/Debian)

📊 Project Management

Task Management

Jira

Issue tracking and project management

Jira is a proprietary issue tracking product developed by Atlassian that allows bug tracking and agile project management.

Key Features:

  • Issue tracking
  • Agile boards (Scrum/Kanban)
  • Custom workflows
  • Reporting and analytics
  • Integration ecosystem
  • Team collaboration

Installation:

  • Cloud: Sign up at atlassian.com/software/jira
  • Server: Download from Atlassian (requires license)
  • Mobile Apps: Available on iOS and Android app stores

Trello

Kanban-style project boards

Trello is a web-based, Kanban-style, list-making application and is a subsidiary of Atlassian. Users can create their task boards with different columns and move the tasks between them.

Key Features:

  • Kanban boards
  • Card-based organization
  • Team collaboration
  • Power-ups and integrations
  • Mobile apps
  • Template library

Installation:

  • Web: Access at trello.com
  • Desktop Apps:
    • Windows: Available in Microsoft Store
    • macOS: Available in Mac App Store
  • Mobile: Available on iOS and Android

Documentation

Notion

All-in-one workspace for notes, tasks, wikis, and databases

Notion is a freemium productivity and note-taking web application developed by Notion Labs Inc. It offers organizational tools including task management, project tracking, to-do lists, bookmarking, and more.

Key Features:

  • Block-based editor
  • Database functionality
  • Template gallery
  • Team collaboration
  • API integration
  • Cross-platform sync

Installation:

  • Web: Access at notion.so
  • Desktop Apps:
    • Windows/macOS: Download from notion.so/desktop
    • Package Managers:
      • Windows: winget install Notion.Notion
      • macOS: brew install --cask notion
  • Mobile: Available on iOS and Android

🔧 Command Line Tools

Databases

MySQL

Open-source relational database management system

MySQL is an open-source relational database management system. Its name is a combination of "My", the name of co-founder Michael Widenius's daughter, and "SQL", the abbreviation for Structured Query Language.

Key Features:

  • ACID compliance
  • Multi-version concurrency control
  • Wide platform support
  • Replication and clustering
  • Full-text indexing
  • Stored procedures and triggers

Installation:

PostgreSQL

Advanced open-source relational database

PostgreSQL is a free and open-source relational database management system emphasizing extensibility and SQL compliance. It was originally named POSTGRES, referring to its origins as a successor to the Ingres database.

Key Features:

  • ACID compliance
  • Multi-version concurrency control
  • Extensible type system
  • Advanced indexing
  • Full-text search
  • JSON support

Installation:

MongoDB

Document-oriented NoSQL database

MongoDB is a source-available cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas.

Key Features:

  • Document-based storage
  • Horizontal scaling
  • Flexible schema
  • Rich query language
  • Aggregation framework
  • GridFS for large files

Installation:

Redis

In-memory data structure store

Redis is an in-memory data structure store, used as a distributed, in-memory key–value database, cache and message broker, with optional durability.

Key Features:

  • In-memory storage
  • Multiple data structures
  • Pub/Sub messaging
  • Lua scripting
  • Clustering support
  • Persistence options

Installation:

SQLite

Self-contained SQL database engine

SQLite is a C-language library that implements a small, fast, self-contained, high-reliability, full-featured, SQL database engine. SQLite is the most used database engine in the world.

Key Features:

  • Serverless architecture
  • Zero-configuration
  • Cross-platform
  • ACID compliance
  • Small footprint
  • Public domain license

Installation:

System Tools & Utilities

cURL

Command-line tool for transferring data

cURL is a computer software project providing a library and command-line tool for transferring data using various network protocols. The name stands for "Client URL".

Key Features:

  • Multiple protocol support
  • SSL/TLS support
  • HTTP authentication
  • Cookie support
  • Proxy support
  • Cross-platform

Installation:

SSH

Secure Shell protocol

SSH (Secure Shell) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution.

Key Features:

  • Encrypted communication
  • Authentication methods
  • Port forwarding
  • File transfer capabilities
  • Key-based authentication
  • Cross-platform support

Installation:

APT

Advanced Package Tool

APT (Advanced Package Tool) is a free-software user interface that works with core libraries to handle the installation and removal of software on Debian, and Debian-based Linux distributions.

Key Features:

  • Package management
  • Dependency resolution
  • Repository management
  • Security updates
  • Package searching
  • System upgrades

Installation:

DNF/YUM

Package managers for Red Hat-based distributions

DNF (Dandified YUM) is the next-generation version of the Yellowdog Updater Modified (YUM), a package manager for RPM-compatible Linux distributions.

Key Features:

  • Package management
  • Dependency resolution
  • Repository management
  • Plugin system
  • Transaction history
  • Performance improvements

Installation:

Pacman

Package manager for Arch Linux

Pacman is a package manager for the Arch Linux distribution. It combines a simple binary package format with an easy-to-use build system.

Key Features:

  • Binary package management
  • Build system integration
  • Dependency tracking
  • Package signing
  • Delta compression
  • Simple configuration

Installation:

Homebrew

Package manager for macOS and Linux

Homebrew is a free and open-source software package management system that simplifies the installation of software on Apple's operating system, macOS, as well as Linux.

Key Features:

  • Simple installation
  • Formula-based packages
  • Cask support for GUI apps
  • Tap system for third-party repositories
  • Automatic dependency management
  • Cross-platform support

Installation:

npm

Node.js package manager

npm is a package manager for the JavaScript programming language maintained by npm, Inc. npm is the default package manager for the JavaScript runtime environment Node.js.

Key Features:

  • Package installation and management
  • Dependency resolution
  • Script running
  • Version management
  • Registry access
  • Security auditing

Installation:

Dig

DNS lookup tool

Dig (Domain Information Groper) is a network administration command-line tool for querying the Domain Name System (DNS). It is useful for network troubleshooting and for educational purposes.

Key Features:

  • DNS record querying
  • Multiple record type support
  • Batch mode operation
  • Reverse DNS lookups
  • DNSSEC validation
  • Flexible output formats

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install dnsutils
    • macOS: brew install bind
    • Fedora: sudo dnf install bind-utils
  • Documentation: View Dig Cheatsheet

Ping

Network connectivity test tool

Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network.

Key Features:

  • Network connectivity testing
  • Round-trip time measurement
  • Packet loss detection
  • IPv4 and IPv6 support
  • Continuous monitoring
  • Statistics reporting

Installation:

  • Built-in: Pre-installed on most operating systems
  • Platform Support: Windows, macOS, Linux, Unix
  • Documentation: View Ping Cheatsheet

Traceroute

Network path tracing tool

Traceroute is a computer network diagnostic tool for displaying possible routes (paths) and measuring transit delays of packets across an Internet Protocol (IP) network.

Key Features:

  • Network path discovery
  • Hop-by-hop analysis
  • Round-trip time measurement
  • Multiple protocol support
  • Geographic path mapping
  • Network troubleshooting

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install traceroute
    • macOS: Pre-installed
    • Windows: tracert command built-in
  • Documentation: View Traceroute Cheatsheet

Netstat

Network statistics tool

Netstat (network statistics) is a command-line network utility that displays network connections for Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics.

Key Features:

  • Network connection listing
  • Routing table display
  • Interface statistics
  • Protocol statistics
  • Process identification
  • Port monitoring

Installation:

  • Built-in: Pre-installed on most operating systems
  • Package Managers:
    • Ubuntu/Debian: sudo apt install net-tools
    • Platform Support:** Windows, macOS, Linux, Unix
  • Documentation: View Netstat Cheatsheet

GDB

GNU Debugger

GDB, the GNU Project debugger, allows you to see what is going on 'inside' another program while it executes -- or what another program was doing at the moment it crashed.

Key Features:

  • Program debugging
  • Core dump analysis
  • Remote debugging
  • Multi-language support
  • Scripting capabilities
  • Memory analysis

Installation:

Regular Expressions

Pattern matching language

Regular expressions (regex) are sequences of characters that define a search pattern. They are commonly used for string matching, validation, and text processing across many programming languages and tools.

Key Features:

  • Pattern matching
  • Text validation
  • Search and replace
  • Data extraction
  • Cross-language support
  • Powerful syntax

Installation:

Cloud Platforms & CLI Tools

AWS CLI

Amazon Web Services Command Line Interface

The AWS Command Line Interface (CLI) is a unified tool to manage your AWS services. With just one tool to download and configure, you can control multiple AWS services from the command line and automate them through scripts.

Key Features:

  • Unified AWS service management
  • Scripting and automation
  • Multiple output formats
  • Profile management
  • Cross-platform support
  • IAM integration

Installation:

Azure CLI

Microsoft Azure Command Line Interface

The Azure CLI is a cross-platform command-line tool to connect to Azure and execute administrative commands on Azure resources. It allows the execution of commands through a terminal using interactive command-line prompts or a script.

Key Features:

  • Cross-platform support
  • Interactive and scripting modes
  • Azure Resource Manager integration
  • Extension support
  • Cloud Shell integration
  • JSON output format

Installation:

Google Cloud CLI

Google Cloud Platform Command Line Interface

The Google Cloud CLI is a set of tools to create and manage Google Cloud resources. You can use these tools to perform many common platform tasks from the command line or through scripts and other automation.

Key Features:

  • Comprehensive GCP management
  • Authentication integration
  • Configuration management
  • Scripting support
  • Interactive mode
  • Multiple output formats

Installation:

DigitalOcean CLI

DigitalOcean Command Line Interface

doctl is the official DigitalOcean command line interface (CLI). Use doctl to interact with the DigitalOcean API via the command line.

Key Features:

  • Complete DigitalOcean API access
  • Resource management
  • Automation support
  • JSON output
  • Configuration profiles
  • Kubernetes integration

Installation:

Heroku CLI

Heroku Command Line Interface

The Heroku CLI is used to manage and scale your applications, provision add-ons, view your application logs, and run your application locally.

Key Features:

  • Application management
  • Deployment automation
  • Add-on provisioning
  • Log streaming
  • Local development
  • Pipeline management

Installation:

Firebase CLI

Firebase Command Line Interface

The Firebase CLI provides a variety of tools for managing, viewing, and deploying to Firebase projects. It's the primary tool for local Firebase development and deployment.

Key Features:

  • Project management
  • Local development server
  • Deployment automation
  • Database management
  • Authentication setup
  • Hosting configuration

Installation:

HashiCorp Terraform

Infrastructure as Code tool

Terraform is an open-source infrastructure as code software tool created by HashiCorp. Users define and provide data center infrastructure using a declarative configuration language.

Key Features:

  • Infrastructure as Code
  • Multi-cloud support
  • State management
  • Plan and apply workflow
  • Module system
  • Provider ecosystem

Installation:

HashiCorp Vault

Secrets management tool

Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, or certificates.

Key Features:

  • Secret storage
  • Dynamic secrets
  • Data encryption
  • Leasing and renewal
  • Revocation
  • Audit logging

Installation:

HashiCorp Consul

Service discovery and configuration

Consul is a service networking solution to automate network configurations, discover services, and enable secure connectivity across any cloud or runtime.

Key Features:

  • Service discovery
  • Health checking
  • KV store
  • Multi-datacenter
  • Service mesh
  • Network automation

Installation:

HashiCorp Nomad

Workload orchestrator

Nomad is a flexible workload orchestrator that enables organizations to deploy and manage any containerized or legacy application using a single, unified workflow.

Key Features:

  • Multi-workload support
  • Multi-region federation
  • Flexible scheduling
  • Device plugins
  • Service discovery integration
  • Web UI

Installation:

HashiCorp Packer

Machine image builder

Packer is a free and open source tool for creating identical machine images for multiple platforms from a single source configuration.

Key Features:

  • Multi-platform builds
  • Template-based configuration
  • Provisioner support
  • Post-processor plugins
  • Parallel builds
  • Cloud integration

Installation:

HashiCorp Vagrant

Development environment manager

Vagrant is a tool for building and managing virtual machine environments in a single workflow. With an easy-to-use workflow and focus on automation, Vagrant lowers development environment setup time.

Key Features:

  • Virtual machine management
  • Provider support
  • Provisioning automation
  • Networking configuration
  • Synced folders
  • Plugin ecosystem

Installation:

HashiCorp Waypoint

Application deployment platform

Waypoint provides a modern workflow to build, deploy, and release across platforms. Waypoint uses a single configuration file and common workflow to manage deployments across different platforms.

Key Features:

  • Unified workflow
  • Multi-platform deployment
  • GitOps integration
  • URL generation
  • Logs and exec
  • Plugin system

Installation:

Terminal Emulators

iTerm2

macOS terminal replacement

iTerm2 is a replacement for Terminal and the successor to iTerm. It works on Macs with macOS 10.14 or newer. iTerm2 brings the terminal into the modern age with features you never knew you always wanted.

Key Features:

  • Split panes
  • Hotkey window
  • Search functionality
  • Autocomplete
  • Paste history
  • Instant replay

Installation:

Windows Terminal

Modern terminal application for Windows

Windows Terminal is a modern, fast, efficient, powerful, and productive terminal application for users of command-line tools and shells like Command Prompt, PowerShell, and WSL.

Key Features:

  • Multiple tabs and panes
  • GPU accelerated text rendering
  • Custom themes and styling
  • Unicode and UTF-8 support
  • Custom key bindings
  • Profile management

Installation:

Shell Enhancement

Oh My Zsh

Framework for managing Zsh configuration

Oh My Zsh is an open source, community-driven framework for managing your Zsh configuration. It comes bundled with thousands of helpful functions, helpers, plugins, themes, and a few things that make you shout.

Key Features:

  • 300+ plugins
  • 140+ themes
  • Auto-update functionality
  • Plugin management
  • Custom configurations
  • Community support

Installation:

Oh My Posh

Cross-shell prompt theme engine

Oh My Posh is a custom prompt engine for any shell that has the ability to adjust the prompt string with a function or variable. It provides beautiful and informative prompts across different shells and platforms.

Key Features:

  • Cross-shell support
  • Customizable segments
  • Git integration
  • Performance monitoring
  • Icon support
  • Theme gallery

Installation:

Powerlevel10k

Fast Zsh theme with instant prompt

Powerlevel10k is a theme for Zsh. It emphasizes speed, flexibility and out-of-the-box experience. It's the most feature-rich and fastest theme available.

Key Features:

  • Instant prompt
  • Extensive customization
  • Git status integration
  • Performance optimized
  • Configuration wizard
  • Icon support

Installation:

Starship

Cross-shell prompt

Starship is the minimal, blazing-fast, and infinitely customizable prompt for any shell. It shows the information you need, while staying sleek and minimal.

Key Features:

  • Cross-shell compatibility
  • Fast performance
  • Highly customizable
  • Git integration
  • Language detection
  • Minimal configuration

Installation:

Pure

Minimal and fast Zsh prompt

Pure is a pretty, minimal and fast ZSH prompt. It shows git branch and whether it's dirty, execution time of the last command if it exceeds the threshold, and an optional timestamp.

Key Features:

  • Minimal design
  • Git integration
  • Execution time display
  • Async updates
  • No dependencies
  • Fast performance

Installation:

AI Tools & Prompting Guides

ChatGPT Prompting

OpenAI ChatGPT prompting techniques

ChatGPT is a conversational AI model developed by OpenAI. Effective prompting techniques can significantly improve the quality and relevance of responses from ChatGPT across various use cases.

Key Techniques:

  • Clear and specific instructions
  • Role-based prompting
  • Few-shot examples
  • Chain of thought reasoning
  • Context setting
  • Output formatting

Resources:

Claude Prompting

Anthropic Claude prompting techniques

Claude is an AI assistant created by Anthropic. It's designed to be helpful, harmless, and honest. Effective prompting with Claude involves understanding its capabilities and communication style.

Key Techniques:

  • Constitutional AI principles
  • Detailed context provision
  • Step-by-step reasoning
  • Safety considerations
  • Structured conversations
  • Task decomposition

Resources:

Claude Code

Claude for coding assistance

Claude Code refers to using Anthropic's Claude AI specifically for programming tasks, code review, debugging, and software development assistance.

Key Features:

  • Code generation
  • Bug detection and fixing
  • Code explanation
  • Refactoring suggestions
  • Multiple language support
  • Architecture guidance

Resources:

Gemini Prompting

Google Gemini prompting techniques

Gemini is Google's family of multimodal large language models. It can process text, images, audio, and video, making it versatile for various prompting scenarios.

Key Techniques:

  • Multimodal prompting
  • Context-aware instructions
  • Creative applications
  • Technical problem solving
  • Image and text combination
  • Structured outputs

Resources:

LLaMA Prompting

Meta LLaMA model prompting techniques

LLaMA (Large Language Model Meta AI) is a family of foundation language models developed by Meta. Understanding how to effectively prompt LLaMA models is crucial for optimal performance.

Key Techniques:

  • Model-specific formatting
  • Temperature and parameter tuning
  • System prompts
  • Instruction following
  • Fine-tuning considerations
  • Local deployment

Resources:

DeepSeek Prompting

DeepSeek AI model prompting techniques

DeepSeek is an AI research company that develops large language models. Their models are known for strong performance in coding and reasoning tasks.

Key Techniques:

  • Code-focused prompting
  • Mathematical reasoning
  • Logical problem solving
  • Multi-step instructions
  • Performance optimization
  • Model-specific features

Resources:

Perplexity Prompting

Perplexity AI search prompting techniques

Perplexity AI is an AI-powered search engine that provides conversational answers with citations. It combines search capabilities with language model responses.

Key Techniques:

  • Research-focused queries
  • Citation verification
  • Follow-up questions
  • Source evaluation
  • Fact-checking
  • Academic research

Resources:

Qwen Prompting

Alibaba Qwen model prompting techniques

Qwen is a series of large language models developed by Alibaba Cloud. These models are designed for various applications including chat, coding, and multimodal tasks.

Key Techniques:

  • Multilingual prompting
  • Cultural context awareness
  • Technical documentation
  • Code generation
  • Multimodal capabilities
  • Enterprise applications

Resources:

White Rabbit Neo Prompting

Advanced prompting techniques and methodologies

White Rabbit Neo represents advanced prompting methodologies and techniques for maximizing AI model performance across various tasks and domains.

Key Techniques:

  • Meta-prompting strategies
  • Advanced reasoning chains
  • Multi-model orchestration
  • Prompt optimization
  • Performance benchmarking
  • Custom methodologies

Resources:

Pydantic AI

Type-safe AI framework for Python

Pydantic AI is a Python framework for building type-safe AI applications. It provides structured ways to interact with language models while maintaining data validation and type safety.

Key Features:

  • Type-safe AI interactions
  • Structured data validation
  • Model integration
  • Error handling
  • Performance optimization
  • Production-ready

Installation:

TaskMaster AI

AI task management and automation

TaskMaster AI represents tools and frameworks for managing and automating AI-powered tasks, workflows, and processes in various applications.

Key Features:

  • Task automation
  • Workflow management
  • AI orchestration
  • Performance monitoring
  • Resource optimization
  • Integration capabilities

Resources:

  • Framework Documentation: Various AI task management tools
  • Integration Guides: Platform-specific implementations
  • Best Practices: Task automation methodologies
  • Documentation: View TaskMaster AI Cheatsheet

OpenAI Codex

AI-powered code generation

Codex is an AI system by OpenAI that translates natural language to code. It powers GitHub Copilot and can be used for various programming tasks and code generation.

Key Features:

  • Natural language to code
  • Multiple programming languages
  • Code completion
  • Bug fixing
  • Code explanation
  • API integration

Resources:

🔒 Cybersecurity Tools

Network Discovery & Scanning

ZMap

Fast Internet-wide network scanner

ZMap is a fast single packet network scanner designed for Internet-wide network surveys. It can scan the entire IPv4 address space in under 45 minutes on a gigabit network connection.

Key Features:

  • Internet-wide scanning
  • High-speed performance
  • Modular architecture
  • Custom probe modules
  • Output flexibility
  • Research-focused

Installation:

Web Application Security

Arachni

Web application security scanner

Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of modern web applications.

Key Features:

  • High-performance scanning
  • Modular architecture
  • REST API
  • Web UI
  • Distributed scanning
  • Comprehensive reporting

Installation:

Digital Forensics & Memory Analysis

Volatility

Advanced memory forensics framework

Volatility is an open source memory forensics framework for incident response and malware analysis. It provides a collection of tools for the extraction of digital artifacts from volatile memory (RAM) samples.

Key Features:

  • Memory dump analysis
  • Process analysis
  • Network artifact extraction
  • Malware detection
  • Timeline analysis
  • Plugin architecture

Installation:

Reverse Engineering

Radare2

Reverse engineering framework

Radare2 is a portable reversing framework that can disassemble, analyze, debug, modify and manipulate binary files. It has a set of libraries, tools and plugins to ease reverse engineering tasks.

Key Features:

  • Multi-architecture support
  • Debugger integration
  • Scripting capabilities
  • Graph visualization
  • Hex editor
  • Extensible architecture

Installation:

x64dbg

Windows debugger

x64dbg is an open-source x64/x32 debugger for Windows. It has a comprehensive and familiar, yet new user interface with a focus on debugging and analysis.

Key Features:

  • x64 and x32 support
  • Plugin system
  • Script automation
  • Memory map
  • Call stack analysis
  • Breakpoint management

Installation:

Wireless Security

Wifite

Automated wireless attack tool

Wifite is a tool to audit WEP or WPA encrypted wireless networks. It uses aircrack-ng, pyrit, reaver, tshark tools to perform and automate wireless auditing.

Key Features:

  • Automated attacks
  • Multiple attack methods
  • WEP and WPA support
  • Customizable options
  • Progress monitoring
  • Result reporting

Installation:

Evasion & Obfuscation

Veil

Payload generation framework

Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions. It's part of the Veil-Framework and focuses on payload generation.

Key Features:

  • AV evasion techniques
  • Multiple payload types
  • Encoding options
  • Custom templates
  • Automation support
  • Framework integration

Installation:

Reconnaissance

Recon-ng

Web reconnaissance framework

Recon-ng is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open source web-based reconnaissance quickly and thoroughly.

Key Features:

  • Modular framework
  • Database integration
  • API integrations
  • Automated workflows
  • Report generation
  • Extensible architecture

Installation:

SearchSploit

Exploit database search tool

SearchSploit is a command line search tool for Exploit-DB that also allows you to take a copy of Exploit Database with you wherever you go.

Key Features:

  • Offline exploit database
  • Command-line interface
  • Search functionality
  • Exploit copying
  • Regular updates
  • Integration with tools

Installation:

Network Utilities

Proxychains

Proxy chains tool

Proxychains is a UNIX program, that hooks network-related libc functions in dynamically linked programs via a preloaded DLL and redirects the connections through SOCKS4a/5 or HTTP proxies.

Key Features:

  • Proxy chaining
  • SOCKS and HTTP support
  • DNS resolution control
  • Application hooking
  • Configuration flexibility
  • Anonymity enhancement

Installation:

Responder

LLMNR, NBT-NS and MDNS poisoner

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

Key Features:

  • Protocol poisoning
  • Credential harvesting
  • Rogue server functionality
  • Multiple protocol support
  • Hash capture
  • Network analysis

Installation:

Container Security

Trivy

Container vulnerability scanner

Trivy is a simple and comprehensive vulnerability scanner for containers and other artifacts. It detects vulnerabilities of OS packages and language-specific packages.

Key Features:

  • Container image scanning
  • Filesystem scanning
  • Git repository scanning
  • Kubernetes scanning
  • SBOM generation
  • Policy enforcement

Installation:

Falco

Runtime security monitoring

Falco is a cloud native runtime security tool that makes it easy to consume kernel events, and enrich those events with information from Kubernetes and the rest of the cloud native stack.

Key Features:

  • Runtime threat detection
  • Kubernetes integration
  • Custom rule engine
  • Real-time monitoring
  • Alert integration
  • Cloud native focus

Installation:

☁️ Cloud Platforms

Cloud Providers

AWS (Amazon Web Services)

Comprehensive cloud computing platform

Amazon Web Services is a subsidiary of Amazon providing on-demand cloud computing platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go basis.

Key Services:

  • EC2 (Compute)
  • S3 (Storage)
  • RDS (Database)
  • Lambda (Serverless)
  • CloudFormation (Infrastructure)
  • IAM (Identity Management)

Getting Started:

Vercel

Frontend deployment platform

Vercel is a cloud platform for static sites and Serverless Functions that fits perfectly with your workflow. It enables developers to host Jamstack websites and web services that deploy instantly.

Key Features:

  • Instant deployments
  • Global CDN
  • Serverless functions
  • Preview deployments
  • Custom domains
  • Analytics

Getting Started:

  • Web: Sign up at vercel.com
  • CLI: npm install -g vercel
  • GitHub Integration: Connect repositories for automatic deployments

Netlify

Web development platform

Netlify is a San Francisco-based cloud computing company that offers hosting and serverless backend services for web applications and static websites.

Key Features:

  • Continuous deployment
  • Form handling
  • Identity management
  • Edge functions
  • Split testing
  • Analytics

Getting Started:

  • Web: Sign up at netlify.com
  • CLI: npm install -g netlify-cli
  • Git Integration: Connect repositories for automatic deployments

Mobile Security & Forensics

Frida

Dynamic instrumentation toolkit

Frida is a dynamic code instrumentation toolkit for developers, reverse-engineers, and security researchers. It lets you inject snippets of JavaScript or your own library into native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX.

Key Features:

  • Dynamic instrumentation
  • Cross-platform support
  • JavaScript API
  • Real-time analysis
  • Function hooking
  • Memory manipulation

Installation:

MobSF

Mobile Security Framework

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

Key Features:

  • Static analysis
  • Dynamic analysis
  • Malware analysis
  • API security testing
  • Web interface
  • Report generation

Installation:

Drozer

Android security testing framework

Drozer is a security testing framework for Android. It allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS.

Key Features:

  • Android app testing
  • IPC endpoint analysis
  • Content provider testing
  • Service enumeration
  • Activity testing
  • Vulnerability assessment

Installation:

QARK

Quick Android Review Kit

QARK (Quick Android Review Kit) is designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs.

Key Features:

  • Static analysis
  • APK analysis
  • Source code review
  • Vulnerability detection
  • Report generation
  • Automated scanning

Installation:

AndroGuard

Android application analysis platform

AndroGuard is a full python tool to play with Android files. It provides a set of tools to analyze Android applications and the Android platform.

Key Features:

  • APK analysis
  • DEX file analysis
  • Bytecode analysis
  • Control flow graphs
  • Call graphs
  • Signature detection

Installation:

Digital Forensics

Autopsy

Digital forensics platform

Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer.

Key Features:

  • Timeline analysis
  • Hash filtering
  • Keyword searching
  • Web artifacts
  • Email analysis
  • Registry analysis

Installation:

The Sleuth Kit

Digital forensics tools

The Sleuth Kit (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data.

Key Features:

  • File system analysis
  • Volume analysis
  • Timeline creation
  • Hash database support
  • Metadata analysis
  • Deleted file recovery

Installation:

OSINT Tools

Maltego

Link analysis software

Maltego is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.

Key Features:

  • Graph-based analysis
  • Data mining
  • Link analysis
  • Transform hub
  • Collaboration features
  • Export capabilities

Installation:

Database Security

NoSQLMap

NoSQL injection testing tool

NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases and web applications using NoSQL.

Key Features:

  • NoSQL injection testing
  • Multiple database support
  • Automated exploitation
  • Payload generation
  • Vulnerability scanning
  • Report generation

Installation:

Reverse Engineering

Cutter

Free and open-source reverse engineering platform

Cutter is a free and open-source reverse engineering platform powered by Rizin. It aims at being an advanced and customizable reverse-engineering platform while keeping the user experience in mind.

Key Features:

  • Graph visualization
  • Decompiler integration
  • Debugger support
  • Plugin system
  • Cross-platform
  • Modern UI

Installation:

Rizin

UNIX-like reverse engineering framework

Rizin is a free and open-source reverse engineering framework, providing a complete binary analysis experience with features like disassembler, hexadecimal editor, emulation, binary inspection, debugger, and more.

Key Features:

  • Multi-architecture support
  • Scriptable interface
  • Plugin architecture
  • Emulation capabilities
  • Binary analysis
  • Debugging support

Installation:

🔒 Security Tools

Password Management

1Password

Password manager and digital vault

1Password is a password manager developed by AgileBits Inc. It provides a place for users to store various passwords, software licenses, and other sensitive information in a virtual vault.

Key Features:

  • Password generation
  • Secure sharing
  • Two-factor authentication
  • Travel mode
  • Watchtower security
  • Cross-platform sync

Installation:

  • All Platforms: Download from 1password.com
  • Package Managers:
    • Windows: winget install AgileBits.1Password
    • macOS: brew install --cask 1password
  • Browser Extensions: Available for all major browsers

Bitwarden

Open-source password manager

Bitwarden is a freemium open-source password management service that stores sensitive information such as website credentials in an encrypted vault.

Key Features:

  • Open source
  • Cross-platform
  • Secure sharing
  • Two-factor authentication
  • Self-hosting option
  • Free tier available

Installation:

  • All Platforms: Download from bitwarden.com
  • Package Managers:
    • Windows: winget install Bitwarden.Bitwarden
    • macOS: brew install --cask bitwarden
    • Linux: sudo snap install bitwarden

Productivity & Development Frameworks

PowerShell

Cross-platform task automation and configuration management framework

PowerShell is a cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework. PowerShell runs on Windows, Linux, and macOS.

Key Features:

  • Object-oriented pipeline
  • Extensive cmdlet library
  • Remote management
  • Scripting capabilities
  • Cross-platform support
  • Integration with .NET

Installation:

Vim

Highly configurable text editor

Vim is a highly configurable text editor built to make creating and changing any kind of text very efficient. It is included as "vi" with most UNIX systems and with Apple OS X.

Key Features:

  • Modal editing
  • Extensive customization
  • Plugin ecosystem
  • Keyboard-centric
  • Cross-platform
  • Lightweight

Installation:

Neovim

Hyperextensible Vim-based text editor

Neovim is a project that seeks to aggressively refactor Vim in order to simplify maintenance and encourage contributions, split the work between multiple developers, enable advanced UIs, and maximize extensibility.

Key Features:

  • Lua scripting
  • Built-in LSP support
  • Async job control
  • Better plugin architecture
  • Modern terminal features
  • Backward compatibility

Installation:

Emacs

Extensible, customizable text editor

GNU Emacs is a free software text editor. It was created by GNU Project founder Richard Stallman. In common with other varieties of Emacs, GNU Emacs is extensible using a Turing complete programming language.

Key Features:

  • Extensible with Lisp
  • Built-in package manager
  • Org mode
  • Multiple buffers
  • Integrated development environment
  • Cross-platform

Installation:

Nano

Simple text editor

GNU nano is a text editor for Unix-like computing systems or operating environments using a command line interface. It emulates the Pico text editor, part of the Pine email client, and also provides additional functionality.

Key Features:

  • Simple interface
  • Syntax highlighting
  • Search and replace
  • Multiple file buffers
  • Undo/redo
  • Lightweight

Installation:

tmux

Terminal multiplexer

tmux is a terminal multiplexer. It lets you switch easily between several programs in one terminal, detach them (they keep running in the background) and reattach them to a different terminal.

Key Features:

  • Session management
  • Window splitting
  • Detachable sessions
  • Scriptable
  • Customizable
  • Remote session support

Installation:

Screen

Terminal multiplexer

GNU Screen is a terminal multiplexer, a software application that can be used to multiplex several virtual consoles, allowing a user to access multiple separate login sessions inside a single terminal window.

Key Features:

  • Session persistence
  • Multiple windows
  • Session sharing
  • Logging capabilities
  • Copy mode
  • Customizable

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install screen
    • macOS: brew install screen (usually pre-installed)
    • Windows: Available via WSL
  • Documentation: View Screen Cheatsheet

Make

Build automation tool

Make is a build automation tool that automatically builds executable programs and libraries from source code by reading files called Makefiles which specify how to derive the target program.

Key Features:

  • Dependency tracking
  • Incremental builds
  • Cross-platform
  • Rule-based building
  • Variable substitution
  • Pattern rules

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install make
    • macOS: brew install make (usually pre-installed with Xcode)
    • Windows: Available via MinGW or WSL
  • Documentation: View Make Cheatsheet

CMake

Cross-platform build system

CMake is a cross-platform free and open-source software tool for managing the build process of software using a compiler-independent method. It supports directory hierarchies and applications that depend on multiple libraries.

Key Features:

  • Cross-platform builds
  • Generator support
  • Dependency management
  • Testing integration
  • Package finding
  • Modern C++ support

Installation:

Gradle

Build automation tool

Gradle is a build automation tool for multi-language software development. It controls the development process in the tasks of compilation and packaging to testing, deployment, and publishing.

Key Features:

  • Incremental builds
  • Build cache
  • Dependency management
  • Multi-project builds
  • Plugin ecosystem
  • Kotlin DSL support

Installation:

Maven

Build automation and project management tool

Apache Maven is a build automation tool used primarily for Java projects. Maven can also be used to build and manage projects written in C#, Ruby, Scala, and other languages.

Key Features:

  • Dependency management
  • Project object model
  • Plugin architecture
  • Repository system
  • Build lifecycle
  • Multi-module projects

Installation:

Ant

Java-based build tool

Apache Ant is a software tool for automating software build processes. It originally came from the Apache Tomcat project in early 2000 as a replacement for the Make build tool of Unix.

Key Features:

  • XML-based build files
  • Cross-platform
  • Extensible
  • Task-oriented
  • Java integration
  • IDE support

Installation:

SBT

Scala build tool

sbt is a build tool for Scala, Java, and more. It requires Java 1.8 or later. sbt uses a small number of concepts to support flexible and powerful build definitions.

Key Features:

  • Incremental compilation
  • Interactive shell
  • Scala integration
  • Dependency management
  • Plugin system
  • Multi-project builds

Installation:

Bazel

Build and test tool

Bazel is a free software tool for the automation of building and testing of software. The company Google uses the build tool Blaze internally and released an open-sourced port of the Blaze tool as Bazel.

Key Features:

  • Fast incremental builds
  • Multi-language support
  • Scalable
  • Remote execution
  • Hermetic builds
  • Extensible

Installation:

📱 Mobile Development

Cross-Platform Frameworks

React Native

Build mobile apps using React

React Native is an open-source UI software framework created by Meta Platforms, Inc. It is used to develop applications for Android, Android TV, iOS, macOS, tvOS, Web, Windows and UWP.

Key Features:

  • Cross-platform development
  • Hot reloading
  • Native performance
  • Large ecosystem
  • Code sharing with React
  • Strong community

Installation:

Flutter

Google's UI toolkit for building natively compiled applications

Flutter is an open-source UI software development kit created by Google. It is used to develop cross platform applications for Android, iOS, Linux, macOS, Windows, Google Fuchsia, and the web from a single codebase.

Key Features:

  • Single codebase
  • Hot reload
  • Rich widgets
  • Native performance
  • Strong typing (Dart)
  • Google backing

Installation:

Additional Cybersecurity Tools

Aircrack-ng

Wireless network security assessment tool suite

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: monitoring, attacking, testing, and cracking.

Key Features:

  • Packet capture and analysis
  • WEP and WPA/WPA2 cracking
  • Fake access point creation
  • Deauthentication attacks
  • Wireless network monitoring
  • Dictionary and brute force attacks

Installation:

Bettercap

Network attack and monitoring framework

Bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.

Key Features:

  • WiFi networks reconnaissance and attacks
  • Bluetooth Low Energy scanning and fuzzing
  • HID device attacks
  • Network spoofing and MITM
  • Web interface
  • Extensible with modules

Installation:

Hydra

Network logon cracker

Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.

Key Features:

  • Multiple protocol support
  • Parallel processing
  • Dictionary attacks
  • Brute force attacks
  • Modular architecture
  • Cross-platform support

Installation:

Nessus

Vulnerability assessment scanner

Nessus is a proprietary vulnerability scanner developed by Tenable, Inc. It is free of charge for personal use in a non-enterprise environment. Nessus is the most deployed vulnerability scanner in the industry.

Key Features:

  • Comprehensive vulnerability scanning
  • Configuration auditing
  • Malware detection
  • Sensitive data discovery
  • Web application scanning
  • Compliance checking

Installation:

Burp Suite

Web application security testing platform

Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving you the most advanced tools to find more vulnerabilities, faster. Our world-renowned research team's discoveries feature in Burp Suite to ensure you're always ahead of the curve.

Key Features:

  • Web application scanning
  • Manual testing tools
  • Proxy functionality
  • Intruder for automated attacks
  • Repeater for request manipulation
  • Extensible with plugins

Installation:

Wireshark

Network protocol analyzer

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.

Key Features:

  • Deep inspection of protocols
  • Live capture and offline analysis
  • Rich VoIP analysis
  • Read/write many file formats
  • Coloring rules for analysis
  • Output can be exported to XML, PostScript, CSV, or plain text

Installation:

John the Ripper

Password cracking tool

John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platforms. It is among the most frequently used password testing and breaking programs as it combines a number of password crackers into one package.

Key Features:

  • Multiple hash format support
  • Dictionary attacks
  • Brute force attacks
  • Hybrid attacks
  • Distributed cracking
  • Custom rules

Installation:

Hashcat

Advanced password recovery tool

Hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and macOS.

Key Features:

  • GPU acceleration
  • Multiple attack modes
  • 300+ hash algorithms
  • Distributed cracking
  • Rule-based attacks
  • Mask attacks

Installation:

Metasploit

Penetration testing framework

The Metasploit Framework is a Ruby-based, modular penetration testing platform that enables you to write, test, and execute exploit code. The Metasploit Framework contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection.

Key Features:

  • Exploit development and execution
  • Payload generation
  • Post-exploitation modules
  • Auxiliary modules
  • Evasion techniques
  • Extensive database

Installation:

Nmap

Network discovery and security auditing tool

Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

Key Features:

  • Host discovery
  • Port scanning
  • Service detection
  • OS detection
  • Scriptable interaction
  • Stealth scanning

Installation:

SQLMap

Automatic SQL injection and database takeover tool

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.

Key Features:

  • Automatic SQL injection detection
  • Database fingerprinting
  • Data extraction
  • File system access
  • Operating system takeover
  • Out-of-band connections

Installation:

OWASP ZAP

Web application security scanner

The OWASP Zed Attack Proxy (ZAP) is one of the world's most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications.

Key Features:

  • Automated scanning
  • Manual testing tools
  • Passive scanning
  • Active scanning
  • API testing
  • Authentication support

Installation:

This tools directory provides comprehensive information about essential development tools, including installation instructions and key features. Each tool entry includes direct links to official websites and package manager commands for easy installation across different operating systems.

🔒 Cybersecurity Tools

Command & Control (C2) Frameworks

VSagent

C2 framework that hides traffic in VIEWSTATE parameters

VSagent is a specialized command and control framework that disguises malicious traffic by embedding it within ASP.NET VIEWSTATE parameters, making detection significantly more challenging for traditional security monitoring tools.

Key Features:

  • VIEWSTATE parameter obfuscation
  • Web application traffic mimicry
  • Stealth communication channels
  • Custom payload encoding
  • Anti-detection mechanisms
  • Lightweight footprint

Installation:

Ares RAT

Python-based remote access tool with web interface

Ares RAT is a comprehensive remote access tool built in Python that provides a web-based interface for managing compromised systems, offering both ease of use and powerful post-exploitation capabilities.

Key Features:

  • Web-based management interface
  • Cross-platform compatibility
  • File system manipulation
  • Screen capture capabilities
  • Keylogging functionality
  • Network reconnaissance

Installation:

Active Directory & Windows Tools

SharpUp

C# port of PowerUp for privilege escalation enumeration

SharpUp is a C# implementation of PowerUp that performs comprehensive privilege escalation checks on Windows systems, identifying potential vectors for elevating privileges in Active Directory environments.

Key Features:

  • Comprehensive privilege escalation checks
  • Service enumeration and analysis
  • Registry vulnerability detection
  • File permission auditing
  • Scheduled task analysis
  • .NET framework integration

Installation:

Mobile Security Tools

Objection

Runtime mobile exploration toolkit powered by Frida

Objection is a runtime mobile exploration toolkit that leverages Frida to provide comprehensive security testing capabilities for iOS and Android applications during dynamic analysis.

Key Features:

  • Runtime application manipulation
  • SSL pinning bypass
  • Method hooking and tracing
  • File system exploration
  • Memory dumping
  • API interaction monitoring

Installation:

Evasion & Obfuscation Tools

Shellter

Dynamic shellcode injection tool

Shellter is a dynamic shellcode injection tool, and the first truly dynamic PE infector ever created. It can be used in order to inject shellcode into native Windows applications (currently 32-bit applications only).

Key Features:

  • Dynamic PE infection
  • Shellcode injection
  • Anti-virus evasion
  • Steganographic encoding
  • Polymorphic code generation
  • Automatic mode operation

Installation:

Network Security Tools

RustScan

Modern port scanner

RustScan is a modern take on the port scanner. Faster, smarter, more efficient. RustScan uses modern async/await syntax to make it blazingly fast.

Key Features:

  • Ultra-fast scanning
  • Adaptive learning
  • Custom scripting
  • Nmap integration
  • IPv6 support
  • JSON output

Installation:

Reaver

WPS brute force attack tool

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Key Features:

  • WPS PIN brute forcing
  • WPA/WPA2 passphrase recovery
  • Pixie dust attacks
  • Session management
  • Progress tracking
  • Multiple interface support

Installation:

WifiForge

WiFi security testing framework

WifiForge is a comprehensive WiFi security testing framework that provides tools for wireless network assessment, penetration testing, and security analysis.

Key Features:

  • Wireless network discovery
  • Security assessment tools
  • Attack automation
  • Report generation
  • Multiple attack vectors
  • Framework integration

Installation:

Sguil

Network security monitoring platform

Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil's main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures.

Key Features:

  • Real-time event monitoring
  • Packet capture analysis
  • Alert management
  • Session reconstruction
  • Database integration
  • Multi-sensor support

Installation:

Squert

Web application for browsing Sguil events

Squert is a web application that is used to query and view event data stored in a Sguil database (typically IDS alert data). Squert is a visual tool that attempts to provide additional context to events through the use of metadata, time series representations and weighted and logically grouped result sets.

Key Features:

  • Web-based interface
  • Event visualization
  • Time series analysis
  • Metadata correlation
  • Search capabilities
  • Export functionality

Installation:

Snorby

Ruby on Rails web application for network security monitoring

Snorby is a ruby on rails web application for network security monitoring that interfaces with current popular intrusion detection systems (Snort, Suricata and other NSM tools).

Key Features:

  • Web-based dashboard
  • Alert management
  • Reporting capabilities
  • User management
  • Plugin architecture
  • Multi-sensor support

Installation:

Cloud Security Tools

CloudMapper

AWS security assessment tool

CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser. It now contains much more functionality, including auditing for security issues.

Key Features:

  • AWS environment mapping
  • Security assessment
  • Network visualization
  • Compliance checking
  • Resource inventory
  • Risk analysis

Installation:

Docker Bench

Docker security benchmark script

The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The tests are all automated, and are inspired by the CIS Docker Benchmark v1.2.0.

Key Features:

  • Security benchmark testing
  • CIS compliance checking
  • Automated assessment
  • Detailed reporting
  • Best practice validation
  • Container security analysis

Installation:

  • GitHub Repository: https://github.com/docker/docker-bench-security
  • Docker: docker run -it --net host --pid host --userns host --cap-add audit_control -e DOCKER_CONTENT_TRUST=$DOCKER_CONTENT_TRUST -v /etc:/etc:ro -v /usr/bin/containerd:/usr/bin/containerd:ro -v /usr/bin/runc:/usr/bin/runc:ro -v /usr/lib/systemd:/usr/lib/systemd:ro -v /var/lib:/var/lib:ro -v /var/run/docker.sock:/var/run/docker.sock:ro --label docker_bench_security docker/docker-bench-security
  • Documentation: View Docker Bench Cheatsheet

Kube-hunter

Kubernetes security testing tool

kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes environments.

Key Features:

  • Kubernetes security scanning
  • Vulnerability detection
  • Network reconnaissance
  • Privilege escalation testing
  • Configuration assessment
  • Automated reporting

Installation:

Additional Development & System Tools

Git

Distributed version control system

Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.

Key Features:

  • Distributed version control
  • Branching and merging
  • Data integrity
  • Speed and performance
  • Staging area
  • Free and open source

Installation:

Docker

Containerization platform

Docker is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers.

Key Features:

  • Application containerization
  • Image management
  • Container orchestration
  • Cross-platform support
  • Resource isolation
  • Microservices architecture

Installation:

cURL

Command line tool for transferring data

cURL is a computer software project providing a library and command-line tool for transferring data using various network protocols.

Key Features:

  • Multiple protocol support
  • HTTP/HTTPS requests
  • File transfer capabilities
  • Authentication support
  • Proxy support
  • SSL/TLS support

Installation:

SSH

Secure Shell protocol

SSH (Secure Shell) is a cryptographic network protocol for operating network services securely over an unsecured network.

Key Features:

  • Secure remote access
  • Encrypted communication
  • Key-based authentication
  • Port forwarding
  • File transfer capabilities
  • Cross-platform support

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install openssh-client openssh-server
    • macOS: Pre-installed
    • Windows: Available via OpenSSH or PuTTY
  • Documentation: View SSH Cheatsheet

APT

Advanced Package Tool

APT (Advanced Package Tool) is a free-software user interface that works with core libraries to handle the installation and removal of software on Debian and Debian-based Linux distributions.

Key Features:

  • Package management
  • Dependency resolution
  • Repository management
  • Security updates
  • System maintenance
  • Command-line interface

Installation:

  • Platform Support: Debian, Ubuntu, and derivatives
  • Pre-installed: Usually comes with Debian-based systems
  • Documentation: View APT Cheatsheet

Homebrew

Package manager for macOS and Linux

Homebrew is a free and open-source software package management system that simplifies the installation of software on Apple's operating system, macOS, as well as Linux.

Key Features:

  • Package management
  • Formula system
  • Cask support for GUI applications
  • Tap repositories
  • Cross-platform support
  • Community-driven

Installation:

npm

Node.js package manager

npm is a package manager for the JavaScript programming language maintained by npm, Inc. npm is the default package manager for the JavaScript runtime environment Node.js.

Key Features:

  • Package management
  • Dependency resolution
  • Script running
  • Version management
  • Registry access
  • CLI tools

Installation:

GDB

GNU Debugger

GDB, the GNU Project debugger, allows you to see what is going on 'inside' another program while it executes -- or what another program was doing at the moment it crashed.

Key Features:

  • Program debugging
  • Breakpoint management
  • Memory inspection
  • Stack trace analysis
  • Variable examination
  • Remote debugging

Installation:

Dig

DNS lookup tool

dig (domain information groper) is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried.

Key Features:

  • DNS query tool
  • Multiple record types
  • Batch mode operation
  • Reverse lookups
  • Trace functionality
  • Output formatting

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install dnsutils
    • macOS: brew install bind (usually pre-installed)
    • Windows: Available via WSL or third-party tools
  • Documentation: View Dig Cheatsheet

Ping

Network connectivity testing tool

Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol network.

Key Features:

  • Network connectivity testing
  • Round-trip time measurement
  • Packet loss detection
  • IPv4 and IPv6 support
  • Continuous monitoring
  • Statistics reporting

Installation:

Traceroute

Network path tracing tool

Traceroute is a computer network diagnostic tool for displaying possible routes (paths) and measuring transit delays of packets across an Internet Protocol network.

Key Features:

  • Network path tracing
  • Hop-by-hop analysis
  • Latency measurement
  • Route discovery
  • Network troubleshooting
  • Multiple protocols

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install traceroute
    • macOS: Pre-installed
    • Windows: tracert command available
  • Documentation: View Traceroute Cheatsheet

Netstat

Network statistics tool

Netstat is a command-line network utility that displays network connections for Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics.

Key Features:

  • Network connection monitoring
  • Port status checking
  • Routing table display
  • Interface statistics
  • Protocol statistics
  • Process identification

Installation:

  • Pre-installed: Available on most operating systems
  • Package Managers:
    • Ubuntu/Debian: sudo apt install net-tools
    • macOS: Pre-installed
    • Windows: Pre-installed
  • Documentation: View Netstat Cheatsheet

Regular Expressions

Pattern matching language

Regular expressions (regex) are sequences of characters that define a search pattern. Usually such patterns are used by string-searching algorithms for "find" or "find and replace" operations on strings.

Key Features:

  • Pattern matching
  • Text processing
  • Search and replace
  • Data validation
  • Text extraction
  • Cross-language support

Resources:

Final Batch of Specialized Tools

Python

High-level programming language

Python is an interpreted, high-level and general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant whitespace.

Key Features:

  • Easy to learn and use
  • Extensive standard library
  • Cross-platform compatibility
  • Large ecosystem of packages
  • Multiple programming paradigms
  • Strong community support

Installation:

JavaScript

Programming language for web development

JavaScript is a programming language that conforms to the ECMAScript specification. JavaScript is high-level, often just-in-time compiled, and multi-paradigm.

Key Features:

  • Client-side and server-side development
  • Dynamic typing
  • First-class functions
  • Prototype-based object-orientation
  • Event-driven programming
  • Extensive ecosystem

Resources:

Bash

Unix shell and command language

Bash is a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell.

Key Features:

  • Command-line interface
  • Scripting capabilities
  • Job control
  • Command history
  • Tab completion
  • Alias support

Installation:

  • Pre-installed: Available on most Unix-like systems
  • Package Managers:
    • Ubuntu/Debian: Usually pre-installed
    • macOS: Pre-installed
    • Windows: Available via WSL or Git Bash
  • Documentation: View Bash Cheatsheet

Fish

Smart and user-friendly command line shell

Fish is a smart and user-friendly command line shell for Linux, macOS, and the rest of the family. Fish includes features like syntax highlighting, autosuggestions, and tab completions that just work.

Key Features:

  • Syntax highlighting
  • Autosuggestions
  • Tab completions
  • Web-based configuration
  • Scripting capabilities
  • User-friendly design

Installation:

Zsh

Extended Bourne shell

Zsh is an extended Bourne shell with many improvements, including some features of Bash, ksh, and tcsh. It's designed to be interactive and incorporates many useful features.

Key Features:

  • Advanced tab completion
  • Spelling correction
  • Theme support
  • Plugin system
  • Powerful globbing
  • Command history sharing

Installation:

GCC

GNU Compiler Collection

GCC is a compiler system produced by the GNU Project supporting various programming languages. GCC is a key component of the GNU toolchain and the standard compiler for most projects related to GNU and Linux.

Key Features:

  • Multiple language support
  • Cross-platform compilation
  • Optimization capabilities
  • Debugging support
  • Standards compliance
  • Open source

Installation:

Clang

C language family frontend for LLVM

Clang is a compiler front end for the C, C++, Objective-C, and Objective-C++ programming languages, as well as the OpenMP, OpenCL, RenderScript, CUDA and HIP frameworks.

Key Features:

  • Fast compilation
  • Excellent diagnostics
  • Static analysis
  • Cross-platform support
  • LLVM backend
  • Standards compliance

Installation:

MySQL

Relational database management system

MySQL is an open-source relational database management system. Its name is a combination of "My", the name of co-founder Michael Widenius's daughter, and "SQL", the abbreviation for Structured Query Language.

Key Features:

  • ACID compliance
  • Multi-version concurrency control
  • SQL standard support
  • Replication and clustering
  • Performance optimization
  • Cross-platform support

Installation:

PostgreSQL

Advanced open source relational database

PostgreSQL is a powerful, open source object-relational database system with over 30 years of active development that has earned it a strong reputation for reliability, feature robustness, and performance.

Key Features:

  • ACID compliance
  • Advanced data types
  • Full-text search
  • JSON support
  • Extensibility
  • Standards compliance

Installation:

MongoDB

Document-oriented NoSQL database

MongoDB is a source-available cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with optional schemas.

Key Features:

  • Document-based storage
  • Horizontal scaling
  • Flexible schema
  • Rich query language
  • Aggregation framework
  • GridFS for large files

Installation:

Redis

In-memory data structure store

Redis is an open source, in-memory data structure store, used as a database, cache, and message broker. Redis provides data structures such as strings, hashes, lists, sets, sorted sets with range queries, bitmaps, hyperloglogs, geospatial indexes, and streams.

Key Features:

  • In-memory storage
  • Data persistence
  • Pub/Sub messaging
  • Lua scripting
  • Clustering support
  • Multiple data structures

Installation:

SQLite

Self-contained SQL database engine

SQLite is a C-language library that implements a small, fast, self-contained, high-reliability, full-featured, SQL database engine. SQLite is the most used database engine in the world.

Key Features:

  • Self-contained
  • Zero-configuration
  • Transactional
  • Small footprint
  • Cross-platform
  • Public domain

Installation:

Additional Essential Tools

DNF/YUM

Package manager for RPM-based Linux distributions

DNF (Dandified YUM) is the next-generation version of the Yellowdog Updater Modified (YUM), a package manager for RPM-based Linux distributions.

Key Features:

  • Package management
  • Dependency resolution
  • Repository management
  • Transaction history
  • Plugin system
  • Performance improvements

Installation:

  • Pre-installed: Available on Fedora, CentOS, RHEL
  • Package Managers:
    • Fedora: dnf (default)
    • CentOS/RHEL: yum or dnf
  • Documentation: View DNF/YUM Cheatsheet

Pacman

Package manager for Arch Linux

Pacman is a package manager for the Arch Linux distribution and its derivatives. It combines a simple binary package format with an easy-to-use build system.

Key Features:

  • Binary package management
  • Build system integration
  • Dependency tracking
  • Package signing
  • Delta compression
  • Simple configuration

Installation:

Ksh

Korn shell

The Korn shell (ksh) is a Unix shell which was developed by David Korn at Bell Labs in the early 1980s and announced at USENIX on July 14, 1983.

Key Features:

  • Command-line editing
  • Job control
  • Aliases and functions
  • Arrays
  • Arithmetic evaluation
  • POSIX compliance

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install ksh
    • macOS: brew install ksh
    • Windows: Available via WSL
  • Documentation: View Ksh Cheatsheet

C Shell (csh)

C-like shell

The C shell (csh) is a Unix shell created by Bill Joy while he was a graduate student at University of California, Berkeley in the late 1970s.

Key Features:

  • C-like syntax
  • Command history
  • Job control
  • Aliases
  • Variable substitution
  • Interactive features

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install csh
    • macOS: Usually pre-installed
    • Windows: Available via WSL
  • Documentation: View C Shell Cheatsheet

POSIX Shell (sh)

POSIX-compliant shell

The POSIX shell (sh) is a command-line interpreter that provides a command line user interface for Unix-like operating systems, conforming to the POSIX standard.

Key Features:

  • POSIX compliance
  • Portable scripting
  • Basic shell features
  • Standard compliance
  • Minimal footprint
  • Cross-platform compatibility

Installation:

Assembly Languages

Low-level programming languages

Assembly language is a low-level programming language for a computer or other programmable device specific to a particular computer architecture.

Supported Architectures:

  • x86 Assembly - 32-bit Intel architecture
  • x86-64 Assembly - 64-bit Intel/AMD architecture
  • ARM Assembly - ARM processor architecture
  • AArch64 Assembly - 64-bit ARM architecture
  • MIPS Assembly - MIPS processor architecture
  • RISC-V Assembly - RISC-V processor architecture

Resources:

Terminal Emulators

Alacritty

Cross-platform, GPU-accelerated terminal emulator

Alacritty is a cross-platform, OpenGL terminal emulator. It is the fastest terminal emulator and focuses on simplicity and performance.

Key Features:

  • GPU acceleration
  • Cross-platform support
  • Configuration via YAML
  • Vi mode
  • Scrollback search
  • True color support

Installation:

iTerm2

Terminal emulator for macOS

iTerm2 is a replacement for Terminal and the successor to iTerm. It works on Macs with macOS 10.14 or newer. iTerm2 brings the terminal into the modern age with features you never knew you always wanted.

Key Features:

  • Split panes
  • Hotkey window
  • Search functionality
  • Autocomplete
  • Paste history
  • Instant replay

Installation:

GNOME Terminal

Terminal emulator for GNOME desktop environment

GNOME Terminal is a terminal emulator for the GNOME desktop environment written by Havoc Pennington and others.

Key Features:

  • Multiple tabs
  • Profile management
  • Transparency support
  • Custom fonts and colors
  • Keyboard shortcuts
  • GNOME integration

Installation:

Ghostty

Fast, feature-rich terminal emulator

Ghostty is a fast, feature-rich terminal emulator that uses platform-native UI and GPU acceleration.

Key Features:

  • GPU acceleration
  • Platform-native UI
  • Configuration system
  • Ligature support
  • True color support
  • Cross-platform

Installation:

Xterm

Standard terminal emulator for X Window System

Xterm is the standard terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that cannot use the window system directly.

Key Features:

  • VT102 compatibility
  • Tektronix 4014 support
  • Color support
  • Font selection
  • Scrollback buffer
  • X11 integration

Installation:

  • Package Managers:
    • Ubuntu/Debian: sudo apt install xterm
    • macOS: brew install xterm
    • Usually pre-installed on X11 systems
  • Documentation: View Xterm Cheatsheet

Mac Terminal

Built-in terminal for macOS

Terminal is the built-in terminal emulator for macOS, providing command-line access to the Unix-based macOS system.

Key Features:

  • Multiple tabs and windows
  • Profile customization
  • Shell integration
  • Secure keyboard entry
  • Search functionality
  • AppleScript support

Installation:

Windows Terminal

Modern terminal application for Windows

Windows Terminal is a modern, fast, efficient, powerful, and productive terminal application for users of command-line tools and shells like Command Prompt, PowerShell, and WSL.

Key Features:

  • Multiple tabs
  • Panes
  • Unicode and UTF-8 support
  • GPU accelerated text rendering
  • Custom themes and styling
  • Profiles and settings

Installation:

This comprehensive tools directory now provides detailed information about essential development, cybersecurity, and system administration tools, including installation instructions and key features for each tool across multiple platforms.

Installation:

Wireless Security Tools

Reaver

WPS PIN brute force attack tool for wireless security testing

Reaver is a specialized tool for exploiting WPS (Wi-Fi Protected Setup) vulnerabilities by performing brute force attacks against WPS PIN authentication mechanisms.

Key Features:

  • WPS PIN brute forcing
  • Pixie dust attacks
  • Session management
  • Progress tracking
  • Multiple attack modes
  • Comprehensive logging

Installation:

WifiForge

Comprehensive wireless security training and testing platform

WifiForge is a comprehensive platform designed for wireless security training and penetration testing, providing educational resources and practical testing capabilities.

Key Features:

  • Educational training modules
  • Practical testing scenarios
  • Vulnerability assessment tools
  • Comprehensive documentation
  • Interactive learning environment
  • Real-world attack simulations

Installation:

Digital Forensics Tools

Autopsy

Comprehensive digital forensics platform with GUI

Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools, providing comprehensive analysis capabilities for digital investigations.

Key Features:

  • Graphical case management
  • Timeline analysis
  • Keyword searching
  • Hash analysis
  • File system analysis
  • Report generation

Installation:

Sleuth Kit

Command-line digital forensics toolkit

The Sleuth Kit is a collection of command-line tools and a C library that allows investigators to analyze disk images and recover files from them, serving as the foundation for many forensics tools.

Key Features:

  • File system analysis
  • Timeline creation
  • Deleted file recovery
  • Metadata extraction
  • Hash database support
  • Cross-platform compatibility

Installation:

OSINT Tools

Maltego

Comprehensive OSINT and graphical link analysis platform

Maltego is a comprehensive open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.

Key Features:

  • Graphical link analysis
  • Transform marketplace
  • Data visualization
  • Social network analysis
  • Threat intelligence integration
  • Custom transform development

Installation:

Database Security Tools

NoSQLMap

NoSQL database security testing and injection tool

NoSQLMap is a comprehensive tool for testing NoSQL database security, providing automated injection testing capabilities for MongoDB, CouchDB, Redis, and other NoSQL databases.

Key Features:

  • Multi-database support
  • Automated injection testing
  • Data extraction capabilities
  • Blind injection techniques
  • Custom payload development
  • Comprehensive reporting

Installation:

Reverse Engineering Tools

Cutter

Modern reverse engineering platform with GUI for Rizin

Cutter is a free and open-source reverse engineering platform powered by Rizin, providing a modern graphical interface for binary analysis and reverse engineering tasks.

Key Features:

  • Modern graphical interface
  • Graph view analysis
  • Decompiler integration
  • Plugin system
  • Cross-platform support
  • Collaborative features

Installation:

Rizin

Modern reverse engineering framework and command-line toolkit

Rizin is a free and open-source reverse engineering framework that provides a complete toolkit for binary analysis, disassembly, debugging, and exploitation development.

Key Features:

  • Comprehensive disassembly engine
  • Debugging capabilities
  • Scripting support
  • Plugin architecture
  • Cross-platform compatibility
  • Active development community

Installation:

Cloud Security Tools

CloudMapper

AWS environment visualization and security assessment tool

CloudMapper is a comprehensive tool for visualizing and assessing AWS cloud environments, providing security analysis and compliance checking capabilities.

Key Features:

  • AWS environment mapping
  • Security assessment
  • Compliance checking
  • Network visualization
  • Resource inventory
  • Risk analysis

Installation:

Container Security Tools

Docker Bench

Docker security audit tool implementing CIS benchmarks

Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production, based on the CIS Docker Benchmark.

Key Features:

  • CIS benchmark compliance
  • Automated security auditing
  • Comprehensive reporting
  • Container configuration analysis
  • Host security assessment
  • Remediation guidance

Installation:

Kube-hunter

Kubernetes penetration testing and security assessment tool

Kube-hunter is a comprehensive security testing tool designed to identify security weaknesses in Kubernetes clusters and provide actionable remediation guidance.

Key Features:

  • Kubernetes security scanning
  • Vulnerability identification
  • Network-based testing
  • Pod-based testing
  • Comprehensive reporting
  • Remediation guidance

Installation:

Authentication Security Tools

Hydra

Comprehensive network authentication cracking tool

Hydra is a parallelized login cracker that supports numerous protocols and services, making it one of the most versatile tools for testing authentication security.

Key Features:

  • Multi-protocol support
  • Parallel processing
  • Custom wordlists
  • Session management
  • Comprehensive logging
  • Cross-platform compatibility

Installation:

Vulnerability Assessment Tools

Nessus

Enterprise vulnerability assessment platform

Nessus is a comprehensive vulnerability assessment solution that provides accurate vulnerability identification, configuration auditing, and compliance checking for enterprise environments.

Key Features:

  • Comprehensive vulnerability scanning
  • Configuration auditing
  • Compliance reporting
  • Web application testing
  • Network discovery
  • Risk prioritization

Installation:

Web Application Security Tools

Burp Suite

Industry-leading web application security testing platform

Burp Suite is a comprehensive platform for web application security testing, providing both automated scanning capabilities and manual testing tools for security professionals.

Key Features:

  • Intercepting proxy
  • Automated scanning
  • Manual testing tools
  • Extension marketplace
  • Collaboration features
  • Comprehensive reporting

Installation:

OWASP ZAP

Free web application security scanner

OWASP ZAP (Zed Attack Proxy) is one of the world's most popular free security tools, providing comprehensive web application security testing capabilities for developers and security professionals.

Key Features:

  • Intercepting proxy
  • Automated scanning
  • Manual testing tools
  • API testing
  • CI/CD integration
  • Extensive plugin ecosystem

Installation:

Network Analysis Tools

Wireshark

World's most widely used network protocol analyzer

Wireshark is a comprehensive network protocol analyzer that provides deep inspection of hundreds of protocols, with live capture and offline analysis capabilities.

Key Features:

  • Deep packet inspection
  • Live capture and offline analysis
  • Rich VoIP analysis
  • Read/write many file formats
  • Powerful display filters
  • Cross-platform support

Installation:

Password Security Tools

John the Ripper

Powerful password cracking tool

John the Ripper is one of the most popular password testing and breaking programs, providing comprehensive password security auditing capabilities.

Key Features:

  • Multiple hash format support
  • Wordlist and brute force attacks
  • Rule-based attacks
  • Distributed cracking
  • Custom algorithms
  • Cross-platform compatibility

Installation:

Hashcat

Advanced password recovery tool with GPU acceleration

Hashcat is the world's fastest and most advanced password recovery tool, supporting GPU acceleration and hundreds of hash algorithms.

Key Features:

  • GPU acceleration support
  • 300+ hash algorithms
  • Multiple attack modes
  • Distributed cracking
  • Real-time performance monitoring
  • Cross-platform compatibility

Installation:

Penetration Testing Frameworks

Metasploit

World's most widely used penetration testing framework

Metasploit is a comprehensive penetration testing platform that provides the infrastructure, content, and tools to perform penetration tests and extensive security auditing.

Key Features:

  • Extensive exploit database
  • Payload generation
  • Post-exploitation modules
  • Auxiliary modules
  • Meterpreter shell
  • Framework extensibility

Installation:

Network Discovery & Security Auditing

Nmap

Network discovery and security auditing tool

Nmap is a free and open source utility for network discovery and security auditing, providing comprehensive host discovery, port scanning, and service detection capabilities.

Key Features:

  • Host discovery
  • Port scanning
  • Service detection
  • OS detection
  • NSE scripting engine
  • Flexible output formats

Installation:

SQL Injection Testing

SQLmap

Automatic SQL injection and database takeover tool

SQLmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers.

Key Features:

  • Automatic SQL injection detection
  • Database fingerprinting
  • Data extraction
  • File system access
  • Operating system takeover
  • Out-of-band connections

Installation:

Wireshark is a free and open-source packet analyzer used for network troubleshooting, analysis, software and communications protocol development, and education.

Key Features:

  • Deep packet inspection
  • Protocol analysis
  • Real-time capture
  • Filtering capabilities
  • Statistical analysis
  • Cross-platform support

Installation:

  • Official Website: Download from wireshark.org
  • Package Managers: Available for all major distributions
  • Requirements: Network interface access
  • Documentation: View Wireshark Cheatsheet

Password Security Tools

John the Ripper

Powerful password cracking tool

John the Ripper is a fast password cracker that supports hundreds of hash and cipher types, making it one of the most versatile tools for password security testing.

Key Features:

  • Multi-format hash support
  • Dictionary attacks
  • Brute force attacks
  • Rule-based attacks
  • Distributed cracking
  • Custom algorithms

Installation:

  • Package Managers: Available for most distributions
  • Source: Compile from GitHub
  • Requirements: C compiler, OpenSSL
  • Documentation: View John the Ripper Cheatsheet

Hashcat

World's fastest password recovery tool

Hashcat is the world's fastest and most advanced password recovery utility, supporting over 300 highly-optimized hashing algorithms and utilizing GPU acceleration for maximum performance.

Key Features:

  • GPU acceleration
  • 300+ hash algorithms
  • Multiple attack modes
  • Distributed cracking
  • Rule-based attacks
  • Mask attacks

Installation:

  • Official Website: Download from hashcat.net
  • Package Managers: Available for most distributions
  • Requirements: OpenCL/CUDA drivers
  • Documentation: View Hashcat Cheatsheet

Penetration Testing Frameworks

Metasploit

World's most widely used penetration testing framework

Metasploit is a comprehensive penetration testing framework that provides the infrastructure, content, and tools to perform penetration tests and extensive security auditing.

Key Features:

  • Exploit development framework
  • Payload generation
  • Post-exploitation modules
  • Auxiliary modules
  • Meterpreter shell
  • Extensive module library

Installation:

  • Official Website: Download from Rapid7
  • Package Managers: Available for most distributions
  • Requirements: Ruby, PostgreSQL
  • Documentation: View Metasploit Cheatsheet

Network Discovery Tools

Nmap

Network discovery and security auditing tool

Nmap (Network Mapper) is a free and open source utility for network discovery and security auditing, capable of scanning large networks and determining what hosts are available.

Key Features:

  • Host discovery
  • Port scanning
  • Service detection
  • OS fingerprinting
  • Scripting engine (NSE)
  • Comprehensive reporting

Installation:

  • Package Managers: Available for all major distributions
  • Official Website: Download from nmap.org
  • Requirements: Network access
  • Documentation: View Nmap Cheatsheet

SQL Injection Testing Tools

SQLmap

Automatic SQL injection and database takeover tool

SQLmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers.

Key Features:

  • Automatic SQL injection detection
  • Database enumeration
  • Data extraction
  • File system access
  • Operating system takeover
  • WAF bypass techniques

Installation:

  • Python: pip install sqlmap
  • GitHub: Clone repository
  • Requirements: Python 3.x
  • Documentation: View SQLmap Cheatsheet

Network Discovery & Scanning Tools

ZMap

Fast internet-wide network scanner

ZMap is a fast single-packet network scanner optimized for Internet-wide network surveys, capable of scanning the entire IPv4 address space in under 45 minutes.

Key Features:

  • Internet-wide scanning capability
  • Single-packet scanning
  • High-speed performance
  • Modular architecture
  • IPv4 address space coverage
  • Research-focused design

Installation:

Web Application Security Tools

Arachni

Web application security scanner framework

Arachni is an open-source, feature-rich web application security scanner capable of detecting various security vulnerabilities in web applications through comprehensive testing.

Key Features:

  • Comprehensive vulnerability detection
  • Modular architecture
  • High-performance scanning
  • REST API support
  • Detailed reporting
  • Custom module development

Installation:

Pegasus-Pentest-Arsenal

Comprehensive web security testing toolkit

Pegasus-Pentest-Arsenal is a comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one unified tool.

Key Features:

  • 10 integrated testing modules
  • Web application focus
  • Comprehensive vulnerability detection
  • User-friendly interface
  • Automated testing capabilities
  • Detailed reporting

Installation:

Wireless Security Tools

Wifite

Automated wireless attack tool

Wifite is an automated wireless attack tool for Linux that simplifies the process of auditing wireless networks by automating various attack techniques.

Key Features:

  • Automated wireless auditing
  • Multiple attack methods
  • WPS attack support
  • Handshake capture
  • Dictionary attacks
  • User-friendly interface

Installation:

Digital Forensics Tools

Volatility

Memory forensics framework

Volatility is the world's most widely used memory forensics tool, providing a comprehensive framework for extracting digital artifacts from volatile memory (RAM) samples.

Key Features:

  • Memory dump analysis
  • Process enumeration
  • Network connection analysis
  • Registry extraction
  • Malware detection
  • Timeline analysis

Installation:

Reverse Engineering Tools

Radare2

Complete reverse engineering framework

Radare2 (r2) is a complete framework for reverse-engineering and analyzing binaries, composed of a set of small utilities that can be used together or independently.

Key Features:

  • Multi-architecture support
  • Disassembly and assembly
  • Debugging capabilities
  • Scripting support
  • Graph visualization
  • Extensive plugin system

Installation:

x64dbg

Open-source Windows debugger

x64dbg is an open-source user mode debugger for Windows, optimized for reverse engineering and malware analysis with support for both x64 and x32 applications.

Key Features:

  • x64 and x32 debugging
  • Plugin system
  • Scripting support
  • Memory analysis
  • Disassembly view
  • Breakpoint management

Installation:

Container Security Tools

Trivy

Comprehensive security scanner

Trivy is an all-in-one open source security scanner that finds vulnerabilities, misconfigurations, and other security issues in containers, Kubernetes, code repositories, and cloud environments.

Key Features:

  • Multi-target scanning
  • Vulnerability detection
  • Misconfiguration scanning
  • Secret detection
  • SBOM generation
  • CI/CD integration

Installation:

Falco

Runtime security monitoring

Falco is a cloud native runtime security tool for Linux operating systems designed to detect and alert on abnormal behavior and potential security threats.

Key Features:

  • Runtime security monitoring
  • Kubernetes integration
  • Custom rule engine
  • Real-time alerting
  • Syscall monitoring
  • Cloud native design

Installation:

Evasion & Obfuscation Tools

Veil

Payload generation framework

Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions, providing various evasion techniques for penetration testing.

Key Features:

  • AV evasion techniques
  • Multiple payload formats
  • Metasploit integration
  • Custom encoding methods
  • Modular architecture
  • Automated generation

Installation:

Reconnaissance Tools

Recon-ng

Web reconnaissance framework

Recon-ng is a full-featured reconnaissance framework designed to provide a powerful environment for conducting open source web-based reconnaissance quickly and thoroughly.

Key Features:

  • Modular framework
  • Database integration
  • API integration
  • Automated reconnaissance
  • Report generation
  • Extensible architecture

Installation:

SearchSploit

Exploit database search tool

SearchSploit is a command line search tool for Exploit-DB that allows you to take a copy of the Exploit Database with you wherever you go.

Key Features:

  • Offline exploit database
  • Command line interface
  • Regular updates
  • Multiple search options
  • Integration with Metasploit
  • Portable database

Installation:

Training & Education Platforms

DVWA

Damn Vulnerable Web Application

DVWA is a PHP/MySQL web application that is damn vulnerable, designed to be an aid for security professionals to test their skills and tools in a legal environment.

Key Features:

  • Deliberately vulnerable web app
  • Multiple difficulty levels
  • Common web vulnerabilities
  • Educational focus
  • Easy deployment
  • Comprehensive documentation

Installation:

WebGoat

OWASP web security training platform

WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons through hands-on exercises.

Key Features:

  • Interactive security lessons
  • OWASP Top 10 coverage
  • Progressive difficulty
  • Detailed explanations
  • Modern web technologies
  • Community support

Installation:

Tool Management Frameworks

PTF (Pentesters Framework)

Penetration testing tool management

PTF is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for penetration testing by automating tool installation and management.

Key Features:

  • Automated tool installation
  • Tool management system
  • Distribution agnostic
  • Regular updates
  • Modular architecture
  • Easy configuration

Installation:

Threat Hunting Tools

Malwoverview

Malware analysis and threat hunting

Malwoverview is a first response tool for threat hunting that performs initial and quick triage of malware samples, URLs, IP addresses, domains, and IOCs using multiple threat intelligence sources.

Key Features:

  • Multi-source threat intelligence
  • Malware sample analysis
  • IOC investigation
  • Automated reporting
  • API integration
  • Batch processing

Installation:

Network Utilities

Proxychains

Proxy chains for anonymity

Proxychains is a tool that forces any TCP connection made by any given application to follow through proxy servers like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy.

Key Features:

  • TCP connection proxying
  • Multiple proxy support
  • TOR integration
  • Dynamic chain support
  • DNS proxying
  • Stealth capabilities

Installation:

Responder

LLMNR/NBT-NS/mDNS poisoner

Responder is a LLMNR, NBT-NS and MDNS poisoner with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

Key Features:

  • Network protocol poisoning
  • Credential harvesting
  • Rogue authentication servers
  • Multiple protocol support
  • NTLM relay capabilities
  • Active Directory targeting

Installation:


This comprehensive cybersecurity tools section provides detailed profiles for 50+ essential security testing tools across 21+ specialized categories. Each tool includes detailed descriptions, key features, installation instructions, and links to comprehensive cheatsheets for in-depth usage guidance.

📊 SIEM & Security Analytics Platforms

Cloud-Native SIEM Solutions

Sumo Logic

Cloud-native security analytics platform

Sumo Logic is a cloud-native machine data analytics platform that delivers real-time continuous intelligence across the entire application lifecycle and stack.

Key Features:

  • Real-time log analytics
  • Machine learning insights
  • Cloud security monitoring
  • Compliance reporting
  • Threat detection
  • Custom dashboards

Installation:

Microsoft Sentinel

Cloud-native SIEM and SOAR solution

Microsoft Sentinel is a scalable, cloud-native security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.

Key Features:

  • Intelligent security analytics
  • Threat hunting capabilities
  • Automated response
  • Machine learning detection
  • Azure integration
  • KQL query language

Installation:

Elastic SIEM

Open-source security analytics platform

Elastic Security combines SIEM, endpoint security, and threat hunting in one solution, built on the Elastic Stack for speed, scale, and relevance.

Key Features:

  • Real-time threat detection
  • Endpoint protection
  • Timeline analysis
  • Machine learning analytics
  • Case management
  • Open-source foundation

Installation:

Traditional SIEM Platforms

Splunk

Security information and event management platform

Splunk is a software platform to search, analyze and visualize machine-generated data gathered from websites, applications, sensors, devices, and other sources.

Key Features:

  • Real-time search and analysis
  • Machine learning capabilities
  • Custom dashboards
  • Alert management
  • Data correlation
  • Extensive app ecosystem

Installation:

Threat Intelligence Platforms

MISP

Malware Information Sharing Platform

MISP is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and threats about cyber security incidents analysis and malware analysis.

Key Features:

  • Threat intelligence sharing
  • IOC management
  • Event correlation
  • API integration
  • Community feeds
  • Automated enrichment

Installation:

🔒 VPN & Network Security Solutions

Modern VPN Solutions

Tailscale

Zero-config mesh VPN

Tailscale is a zero config VPN that installs on any device in minutes, manages firewall rules for you, and works from anywhere.

Key Features:

  • Zero-configuration setup
  • Mesh networking
  • End-to-end encryption
  • Cross-platform support
  • Access control lists
  • Magic DNS

Installation:

Outline VPN

Open-source VPN server

Outline is an open-source project that lets anyone create, run, and share access to their own VPN. Outline is designed to be resistant to blocking.

Key Features:

  • Easy server deployment
  • Shadowsocks protocol
  • Censorship resistance
  • Multi-user support
  • Cross-platform clients
  • Simple management

Installation:

Traditional VPN Solutions

OpenVPN

Open-source VPN solution

OpenVPN is an open-source commercial software that implements virtual private network techniques to create secure point-to-point or site-to-site connections.

Key Features:

  • SSL/TLS encryption
  • Cross-platform support
  • Flexible authentication
  • Network bridging
  • Load balancing
  • High availability

Installation:

🛡️ Network Security Monitoring Platforms

Comprehensive Security Platforms

SecurityOnion

Network security monitoring platform

SecurityOnion is a free and open-source Linux distribution for threat hunting, enterprise security monitoring, and log management.

Key Features:

  • Full packet capture
  • Network security monitoring
  • Intrusion detection (Suricata)
  • Network analysis (Zeek)
  • Log management (Elastic Stack)
  • Case management (TheHive)

Installation:

Digital Forensics Platforms

SIFT Workstation

Digital forensics and incident response toolkit

SIFT (SANS Investigative Forensic Toolkit) Workstation is a group of free open-source incident response and forensic tools designed to perform detailed digital forensic examinations.

Key Features:

  • Forensic imaging tools
  • Memory analysis
  • Network forensics
  • Timeline analysis
  • File carving
  • Malware analysis

Installation:

GRR Rapid Response

Incident response framework

GRR Rapid Response is an incident response framework focused on remote live forensics consisting of a python agent and server infrastructure.

Key Features:

  • Remote forensics
  • Live response
  • Memory analysis
  • File collection
  • Registry analysis
  • Timeline reconstruction

Installation:

Pattern Matching & Detection

YARA

Pattern matching engine for malware research

YARA is a tool aimed at helping malware researchers to identify and classify malware samples by creating descriptions of malware families based on textual or binary patterns.

Key Features:

  • Pattern matching rules
  • Malware classification
  • File scanning
  • Memory scanning
  • Custom rule creation
  • Integration capabilities

Installation:

🔥 Network Security & Firewall Solutions

Enterprise Firewall Platforms

pfSense

Open-source firewall and router platform

pfSense is a free and open-source firewall and router that also features unified threat management, load balancing, multi WAN, and more.

Key Features:

  • Stateful firewall
  • VPN server/client
  • Traffic shaping
  • Load balancing
  • Intrusion detection
  • Web filtering

Installation:

Cisco ASA

Enterprise security appliance

Cisco Adaptive Security Appliance (ASA) is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities.

Key Features:

  • Next-generation firewall
  • VPN concentrator
  • Intrusion prevention
  • Application control
  • URL filtering
  • High availability

Installation:

Linux Firewall Solutions

iptables

Linux kernel firewall

iptables is a user-space utility program that allows a system administrator to configure the IP packet filter rules of the Linux kernel firewall.

Key Features:

  • Packet filtering
  • Network address translation
  • Port forwarding
  • Connection tracking
  • Rate limiting
  • Custom chains

Installation:

  • Pre-installed: Available on most Linux distributions
  • Package Managers:
    • Ubuntu/Debian: sudo apt install iptables
    • CentOS/RHEL: sudo yum install iptables
  • Requirements: Linux kernel with netfilter
  • Documentation: View iptables Cheatsheet

Intrusion Detection Systems

Snort

Network intrusion detection and prevention system

Snort is a free open source network intrusion detection system (IDS) and intrusion prevention system (IPS) created in 1998 by Martin Roesch.

Key Features:

  • Real-time traffic analysis
  • Packet logging
  • Protocol analysis
  • Content searching
  • Rule-based detection
  • Preprocessor modules

Installation:

🐳 Container & Orchestration Security

Container Orchestration

Kubernetes

Container orchestration platform

Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

Key Features:

  • Container orchestration
  • Service discovery
  • Load balancing
  • Storage orchestration
  • Automated rollouts
  • Self-healing

Installation:

kubectl

Kubernetes command-line tool

kubectl is a command-line tool for communicating with a Kubernetes cluster's control plane, using the Kubernetes API.

Key Features:

  • Cluster management
  • Resource deployment
  • Service management
  • Debugging tools
  • Configuration management
  • Scaling operations

Installation:

🎯 Penetration Testing Distributions

Security Testing Platforms

Kali Linux

Penetration testing and security auditing platform

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing, maintained and funded by Offensive Security.

Key Features:

  • 600+ penetration testing tools
  • Forensic capabilities
  • Live boot support
  • ARM support
  • Cloud images
  • Docker containers

Installation:

Baby-naptime

AI-powered vulnerability analysis tool

Baby-naptime is an open source implementation of Google's Project Naptime - a vulnerability analysis tool that uses Large Language Models (LLMs) to discover and exploit native vulnerabilities automatically.

Key Features:

  • Intelligent vulnerability detection using LLMs
  • Automated exploit generation and testing
  • Memory corruption analysis
  • GDB integration for debugging
  • Smart code navigation and analysis
  • Detailed vulnerability reporting
  • Support for multiple LLM models (GPT-4o, O3-mini, O1-preview)
  • Adaptive binary compilation with security mitigations disabled

Installation:

Rogue

Intelligent web vulnerability scanner powered by LLMs

Rogue is an advanced AI security testing agent that leverages Large Language Models to intelligently discover and validate web application vulnerabilities. Unlike traditional scanners, Rogue thinks like a human penetration tester.

Key Features:

  • Intelligent vulnerability discovery using LLMs
  • Advanced payload generation tailored to targets
  • Context-aware testing and analysis
  • Automated exploit verification
  • Comprehensive reporting with reproduction steps
  • Subdomain enumeration and discovery
  • Built-in traffic monitoring and proxy
  • Expandable scope with recursive URL testing

Installation:

Social Engineering Tools

Social Engineer Toolkit (SET)

Social engineering penetration testing framework

The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering attacks.

Key Features:

  • Spear-phishing attacks
  • Website attack vectors
  • Infectious media generator
  • Mass mailer attack
  • SMS spoofing
  • Wireless access point attacks

Installation:


This expanded security tools section provides comprehensive coverage of modern SIEM platforms, VPN solutions, network security monitoring tools, and specialized security frameworks. Each tool includes detailed descriptions, key features, installation instructions, and links to comprehensive cheatsheets for in-depth usage guidance.

System Monitoring & Analysis

Wazuh

Open-source security platform for threat detection and compliance

Wazuh is a comprehensive security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads.

Key Features:

  • Log data analysis and threat detection
  • File integrity monitoring
  • Vulnerability assessment
  • Configuration assessment
  • Incident response
  • Regulatory compliance

Installation:

osquery

SQL-based operating system instrumentation framework

osquery exposes an operating system as a high-performance relational database, allowing SQL-based queries to explore operating system data.

Key Features:

  • SQL-based system queries
  • Cross-platform support
  • Real-time monitoring
  • Scheduled queries
  • Event-based collection
  • Integration with security tools

Installation:

btop

Modern resource monitor for system performance

btop is a modern, cross-platform resource monitor that shows usage and stats for processor, memory, disks, network, and processes.

Key Features:

  • Real-time system monitoring
  • Interactive process management
  • GPU monitoring support
  • Customizable interface
  • Mouse support
  • Multiple themes

Installation:

Data Processing & Analysis

Logstash

Data processing pipeline for Elasticsearch

Logstash is a server-side data processing pipeline that ingests data from multiple sources, transforms it, and sends it to Elasticsearch.

Key Features:

  • Real-time data processing
  • 200+ plugins available
  • Horizontal scalability
  • Flexible pipeline configuration
  • Multiple input/output formats
  • Data transformation capabilities

Installation:

Threat Hunting & Analysis

Strelka

Real-time file analysis system

Strelka is a real-time file analysis system used for threat hunting, threat detection, and incident response.

Key Features:

  • Real-time file scanning
  • Modular architecture
  • Multiple file format support
  • YARA integration
  • Scalable deployment
  • API access

Installation:

Sigma

Generic signature format for SIEM systems

Sigma is a generic and open signature format that allows you to describe relevant log events in a straightforward manner.

Key Features:

  • Generic rule format
  • SIEM-agnostic detection rules
  • Rule conversion tools
  • Community rule repository
  • Threat hunting support
  • Detection engineering

Installation:

CyberChef

Cyber Swiss Army Knife for data transformation

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser.

Key Features:

  • 300+ operations available
  • Drag and drop interface
  • Recipe sharing
  • Bulk operations
  • Data format conversion
  • Cryptographic operations

Installation:

Velociraptor

Digital forensics and incident response platform

Velociraptor is an advanced digital forensic and incident response tool that enhances your visibility into your endpoints.

Key Features:

  • Endpoint visibility
  • Hunt for artifacts
  • Monitor continuously
  • Offline collector
  • Server/client architecture
  • VQL query language

Installation:

Intrusion Detection & Deception

OpenCanary

Honeypot and intrusion detection system

OpenCanary is a daemon that runs several canary versions of services that alerts when a service is (ab)used.

Key Features:

  • Multiple service emulation
  • Configurable alerts
  • Low resource usage
  • Easy deployment
  • Syslog integration
  • Web interface

Installation:

Network Monitoring & Capture

Stenographer

Full packet capture system

Stenographer is a full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes.

Key Features:

  • Full packet capture
  • Fast packet retrieval
  • Scalable storage
  • Query interface
  • Time-based indexing
  • Integration ready

Installation:


This comprehensive tools section now includes essential system monitoring, data processing, threat hunting, intrusion detection, and network capture tools. Each tool provides detailed descriptions, key features, installation instructions, and links to comprehensive cheatsheets for professional security operations.