RSS feed icon for Linux security tools

Security tools

Introduction

When it comes to security tooling for Linux and other platforms, there is enough to choose from. Unfortunately, many tools and scripts are outdated or lack high-quality documentation. We are volunteering to index and categorize all security tools with an open source license.

Top 100

The database currently consists of 521 security tools. Looking for new tools? The top 100 tools is a great start.

Developer

Are you involved in the development of an open source security project? Have a look if we already indexed yours. If not, please submit a tool suggestion.

Top 10 tools

Every week the list of tools is ranked. This is the current top 10 of tools, based on manual reviews and automatic project health measurements.

8 ▴

1. BetterCAP (MitM tool and framework)

bypassing security measures, penetration testing, security assessment

BetterCAP is often used by those who perform penetration testing and security assessments. This tool and framework is in particular useful for attempting man-in-the-middle attacks (MitM).

93 ▴

2. Acra (database encryption proxy)

data encryption, data leak prevention, data security, vulnerability mitigation

Acra is a database encryption proxy that provides encryption and data leakage prevention to applications. It provides selective encryption, access control, database and data leak prevention, and even intrusion detection capabilities. It is focused on developers and supports most popular programming languages such as Go, PHP, Python, Ruby.

5 ▴

3. Buttercup for desktop (cross-platform password manager)

password management

The typical users have at least a multitude of ten when it comes to passwords. Ensuring that every website has a unique password and remembering, is almost impossible. Passwords managers like Buttercup help with the generation and secure storage of these secrets. It is freely available and open source, making it a good alternative for commercial options.

3 ▾

4. Frida (reverse engineering tool)

black-box testing, reverse engineering

Frida allows developers and researchers to inject custom scripts into black box processes. This way it can provide a hook into any function, allowing to trace executed instructions. The source code is not needed. Frida even allows direct manipulation and see the results. The tool comes with bindings for different programming languages, allowing to interact with processes. Example of the bindings that Frida provides include Python, Swift, .NET, Qt/Qml, and C API.

3 ▾

5. WPScan (WordPress vulnerability scanner)

penetration testing, security assessment, vulnerability scanning

WPScan can scan WordPress installations and determine if there are vulnerabilities in a particular installation.

3 ▾

6. ClamAV (malware scanner)

malware analysis, malware detection, malware scanning

ClamAV is a popular tool to detect malicious software or malware. While it calls itself an antivirus engine, it probably won't encounter many viruses, as they have become rare. It is more likely to find other forms of malware like worms, backdoors, and ransomware. ClamAV can be used in a few ways, from doing an occasional scan up to scanning in batch. ClamAV does not do on-access scanning but can be combined with other tools to obtain similar functionality. ClamAV is often u…

3 ▾

7. Zeek (network security monitoring tool)

security monitoring

Zeek helps to perform security monitoring by looking into the network's activity. It can find suspicious data streams. Based on the data, it alert, react, and integrate with other tools.

3 ▾

8. MISP (Malware Information Sharing Platform)

fraud detection, information gathering, threat hunting

MISP collects, stores, and distributes security indicators and discovered threats. This makes the platform useful for those involved with security incidents and malware research. Users benefit from having a well-tested platform to structure the vast number of data points available when it comes to security threats. The tooling allows interaction with other tools, like security incident and event management (SIEM) and intrusion detection systems (IDS).

3 ▾

9. Faraday (collaboration tool for penetration testing)

collaboration, penetration testing, security assessment, vulnerability scanning

Faraday helps teams to collaborate when working on penetration tests or vulnerability management. It stores related security information in one place, which can be easily tracked and tested by other colleagues.

3 ▾

10. Brakeman (static code analyzer for Ruby on Rails)

code analysis

Brakeman is a static code analysis tool for Ruby on Rails to perform a security review. It comes as an open source project with optional commercial support.

Like to see more tools? Have a look at the top 100 list.

Recently reviewed

New and existing security tools are reviewed on a weekly basis.

Archery


Archery is a Django-based application to perform vulnerability assessments and do vulnerability management.

Latest release: 2.0.6 [May 31, 2024]

Wapiti


Wapiti is a security tool to perform vulnerability scans on web applications. It uses fuzzing to detect known and unknown paths, among other tests.

Latest release: 3.2.0 [Aug. 13, 2024]

Patator


Patator is a security tool to perform enumeration or brute-force attempts to discover authentication details. It can be used during penetration testing.

Latest release: 1.0 [Oct. 9, 2023]

BleachBit


BleachBit is an open source tool focused on maintaining your privacy by cleaning up sensitive data on the system.

Latest release: 4.6.0 [Nov. 6, 2023]

OpenSCAP


Tools to assist administrators and auditors with assessment, measurement and enforcement of security baselines

Latest release: 1.4.0 [Aug. 13, 2024]

Lynis


Lynis is a security auditing tool for systems running Linux, macOS, or Unix. It can be used for security assessments and configuration audits.

Latest release: 3.1.1 [March 17, 2024]

BlackBox


BlackBox allows you to store secrets safely in a version control system (VCS) like Git, Mercurial, Subversion, or Perforce). The toolkit has several scripts to encrypt specific files in a repository by using GNU Privacy Guard (GPG).

salt-scanner


Salt-scanner is Linux vulnerability scanner based on Salt Open and Vulners audit API. It has Slack notifications and JIRA integration.

Infection Monkey


The Infection Monkey is a security tool to test the resiliency of a data center or network. It tries to breach the perimeter and infect any internal server. Upon success, it reports the status to the centralized Monkey Island server. This tool can help with automating security assessments or perform a self-assessment.

By first letter

If you know the name, select the first character to see an overview for the related projects.

 A  - B  - C  - D  - E  - F  - G  - H  - I  - J  - K  - L  - M  - N  - O  - P  - Q  - R  - S  - T  - U  - V  - W  - X  - Y  - Z 

Tools by category