Tools starting with E
Looking for new tools to extend your tool box? The top 100 list of best security tools is a great start.
EAPHammer is a toolkit to perform a targeted evil twin attack against WPA2-Enterprise networks. Read how it works in this tool review.
Eapmd5pass is a password attack tool for EAP-MD5 authentication traffic. It uses an offline attack, meaning it deals with captured network data.
The elf2json converts an ELF binary into JSON output and helping with reverse engineering and malware analysis.
Evil Abigail automates a so-called evil maid attack. It does so by backdooring the initial ramdisk (initrd) of Linux systems.
Evilredis tool is an offensive security program for pentesting Redis databases. It can scan the target and perform different actions on it. Read how it works in this review.
Exitmap is a scanner to find Tor exit relays. It focuses on speed and is built as a modular tool to fetch pages, upload files, connect to SSH, and more.
Expliot is a framework to perform security testing of IoT infrastructure and IoT devices. Read how it works in this review.
Exploit Pack is a penetration testing framework that works on Linux, macOS, and Windows. It focuses on automation of penetration testing assignments.
- ZAP (web application analysis)
- Maltrail (malicious traffic detection system)
- Wapiti (vulnerability scanner for web applications)
- Vuls (agentless vulnerability scanner)
- Cppcheck (static code analyzer)
- Zeek (network security monitoring tool)
- XSStrike (XSS detection and exploitation suite)
- Decentraleyes (local CDN emulation for privacy)
- RootHelper (script to retrieve exploitation tools)
- graudit (static code analysis tool)
- Suhosin7 (Suhosin security extension for PHP 7.x)
- gosec (Golang security checker)
- Bleach (sanitizing library for Django)
- siemstress (basic SIEM solution)
- Malice (VirusTotal clone)
- CMSeeK (CMS detection and exploitation)
- Cutter (graphical user interface for radare2)
- massh-enum (OpenSSH user enumeration)
- radare2 (reverse engineering tool and binary analysis)
- nftables (network traffic filtering)
- Malscan (malware scanner for web servers)
- Prowler (AWS benchmark tool)
- BDA (vulnerability scan for Hadoop and Spark)
- Tulpar (web vulnerability scanner)