Tools starting with T
A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z
Looking for new tools to extend your tool box? The top 100 list of best security tools is a great start.
TANNER is the 'brain' of the SNARE tool. It evaluates its events and alters the responses to incoming requests depending on the type of attacks.
Latest release: 0.4 [July 31, 2017]
Termineter is a security framework to test smart meters. It can be used for development purposes or to test the security of supported devices.
Latest release: 0.2.7 [May 18, 2017]
testssl.sh is a command line tool which checks a system on any port for the support of TLS/SSL ciphers, protocols, as well as some cryptographic flaws.
Latest release: 2.9.5.post1 [Sept. 20, 2017]
THC Hydra (thc-hydra)
THC Hydra is a brute-force cracking tool for remote authentication services. It supports many protocols, including telnet, FTP, LDAP, SSH, SNMP, and others.
Latest release: 8.6 [July 21, 2017]
THC IPv6 Attack Toolkit (thc-ipv6)
THC IPv6 attack toolkit a set of utilities. It can be used for penetrating testing and security assessments of correct network implementations.
Latest release: 3.2 [Jan. 18, 2017]
theHarvester is a tool to gather email accounts, subdomains, virtual hosts, open ports, banners, and employee names. It uses different public sources.
The Sleuth Kit is a toolkit to investigate disk images and do forensic analysis on them.
Latest release: sleuthkit-4.4.2 [Aug. 7, 2017]
ThreatPinch is a Chrome extension to perform information lookups on data artifacts like domain names, hashes, IP addresses, and more.
Thug is a low-interaction honeyclient to test for client-side attacks. It mimics a client application, like a web browser and sees if attack code is fired.
Latest release: 0.9.4 [Aug. 29, 2017]
Tiger a security audit and intrusion detection tool for flavors of Unix
TLS-Attacker is a framework to analyze TLS libraries. It is written in Java and developed by the Ruhr University Bochum and Hackmanit GmbH.
The CLI tool tlsenum attempts to enumerate what TLS cipher suites a server supports and then list them in order of priority.
Trawler is a platform for ingesting user phishing reports, processing, triage, and response. It provides a web interface to work the collected data.
Tulpar is a security tool to scan web targets for possible vulnerabilities. It checks a wide range of items and attack types for this particular purpose.
- testssl.sh (TLS/SSL configuration scanner)
- WhatWeb (website fingerprinter)
- vallumd (distributed ipset blacklist for iptables)
- Nikto (web application scanner)
- Exploit Pack (penetration testing framework)
- sslcaudit (auditing tool for SSL/TLS clients)
- Oscanner (Oracle assessment framework)
- SSHsec (SSH configuration scanner)
- VulnFeed (vulnerability feed parser)
- OpenSSL (TLS and SSL toolkit)
- VHostScan (virtual host scanner)
- swap_digger (data excavation tool for Linux swap)
- not24get (password quality checker)
- Certigo (certificate validator tool)
- Trawler (data collection framework for phishing results)
- SCUTUM (ARP filtering)
- Metagoofil (information gathering tool)
- Kube-Bench (security benchmark testing for Kubernetes)
- Dionaea (honeypot)
- NoSQLMap (database enumeration and exploitation)
- Thug (low-interaction honeyclient)
- OpenVAS (vulnerability scanner)
- Wapiti (vulnerability scanner for web applications)