Tools starting with R

Looking for new tools to extend your tool box? The top 100 list of best security tools is a great start.

r2frida

The r2frida project combines the best of both worlds from Radare2 and Frida. Where Radare2 focuses on static analysis of binaries and files, Frida will target running processes. This project combines the powers of both.


Latest release: 3.4.1 [April 9, 2019]

RabbitHole

RabbitHole is a restrictive shell written in Python. It provides a limited set of commands to the user, allowing the administrator to give restrictive access.

radare2

Radare2 is a tool to perform reverse engineering on files of all types. It can be used to analyze malware, firmware, or any other type of binary files. Read how it works in this review.


Latest release: 3.6.0 [June 24, 2019]

rastrea2r

Rastrea2r is a threat hunting utility for indicators of compromise (IOC) and can be used by SOC analysts and incident responders. Learn how it works in this review.

rdr

Rdr is a cross-platform library to perform binary analysis and reverse engineering. It utilizes a unique symbol map for global analysis.

Recon-ng

Recon-ng is a full-featured web reconnaissance framework. It is written in Python and modular, useful for penetrating tests and security assessments.

RemoteRecon

RemoteRecon is a post-exploitation framework. It can be used to maintain access to a system without the need to have a whole toolkit on the target system.

RID_ENUM

RID_ENUM is a security tool to attempt retrieving users from a Windows domain controller. In this review we cover what the tool does and how it works.

RootHelper

RootHelper is a small script to retrieve several enumeration and privilege escalation tools. It can be used during penetration testing.

Rootkit Hunter (rkhunter)

Security tool to search for traces of rootkits, backdoors, and other malicious components on systems running Linux and other flavors of Unix

rootstealer

The rootstealer tool shows an attack that uses X11 by injecting commands via the X11 library (libX11). It detects when the user opens a terminal with root permissions, then activates its predefined commands.

RouterSploit

RouterSploit is a framework to test exploitation of embedded devices. It can be used as part of penetrating testing assignments or security assessments.


Latest release: 3.4.0 [Oct. 17, 2018]

RTA (Red Team Arsenal)

Red Team Arsenal or RTA for short, is security scanner to find vulnerabilities. It scans the assets of a company that are typically found at layer 7 in the OSI model, like DNS and HTTP.

Ruler

Ruler is a security tool that interacts with Exchange servers remotely. It uses either the MAPI/HTTP or RPC/HTTP protocol, with the goal to gain a remote shell.

RSS feed icon for Linux security tools

Recently reviewed

  • Zeek (network security monitoring tool)
  • XSStrike (XSS detection and exploitation suite)
  • Decentraleyes (local CDN emulation for privacy)
  • RootHelper (script to retrieve exploitation tools)
  • graudit (static code analysis tool)
  • Suhosin7 (Suhosin security extension for PHP 7.x)
  • gosec (Golang security checker)
  • CMSeeK (CMS detection and exploitation)
  • siemstress (basic SIEM solution)
  • Bleach (sanitizing library for Django)
  • Malice (VirusTotal clone)
  • SQLMate (a friend of SQLMap with additional features)
  • hBlock (ad blocking and tracker/malware protection)
  • BDA (vulnerability scan for Hadoop and Spark)
  • CMSmap (reconnaissance tool for popular CMS frameworks)
  • Tulpar (web vulnerability scanner)
  • django-security (Security add-ons for Django)
  • Malscan (malware scanner for web servers)
  • Prowler (AWS benchmark tool)
  • Hash Buster (find cleartext of hash)
  • GitMiner (Git data miner)
  • massh-enum (OpenSSH user enumeration)
  • Termineter (smart meter security framework)
  • Cutter (graphical user interface for radare2)
  • SubFinder (subdomain scanner)