RSS feed icon for Linux security tools

Tools starting with T

Looking for new tools to extend your tool box? The top 100 list of best security tools is a great start.

TANNER


TANNER is the 'brain' of the SNARE tool. It evaluates its events and alters the responses to incoming requests depending on the type of attacks.

Latest release: 0.4 [July 31, 2017]

Termineter


Termineter is a security framework to test smart meters. It can be used for development purposes or to test the security of supported devices.

Latest release: 0.2.7 [May 18, 2017]
Recently reviewed

testssl.sh


testssl.sh is a command line tool which checks a system on any port for the support of TLS/SSL ciphers, protocols, as well as some cryptographic flaws.

Latest release: 2.8 [May 10, 2017]

THC Hydra (thc-hydra)


THC Hydra is a brute-force cracking tool for remote authentication services. It supports many protocols, including telnet, FTP, LDAP, SSH, SNMP, and others.

Latest release: 8.6 [July 21, 2017]

THC IPv6 Attack Toolkit (thc-ipv6)


THC IPv6 attack toolkit a set of utilities. It can be used for penetrating testing and security assessments of correct network implementations.

Latest release: 3.2 [Jan. 18, 2017]

theHarvester


theHarvester is a tool to gather email accounts, subdomains, virtual hosts, open ports, banners, and employee names. It uses different public sources.

The Sleuth Kit


The Sleuth Kit is a toolkit to investigate disk images and do forensic analysis on them.

Latest release: sleuthkit-4.4.2 [Aug. 7, 2017]
Recently reviewed

ThreatPinch Lookup


ThreatPinch is a Chrome extension to perform information lookups on data artifacts like domain names, hashes, IP addresses, and more.

Tiger


Tiger a security audit and intrusion detection tool for flavors of Unix

TLS-Attacker


TLS-Attacker is a framework to analyze TLS libraries. It is written in Java and developed by the Ruhr University Bochum and Hackmanit GmbH.

Latest release: 1.2 [Oct. 19, 2016]

tlsenum


The CLI tool tlsenum attempts to enumerate what TLS cipher suites a server supports and then list them in order of priority.

Tulpar


Tulpar is a security tool to scan web targets for possible vulnerabilities. It checks a wide range of items and attack types for this particular purpose.

Recently reviewed

  • Masscan (high-performance port scanner)
  • Vane (WordPress vulnerability scanner)
  • MAT (removal of metadata)
  • Yosai (security framework for Python applications)
  • Wireshark (network traffic analyzer)
  • FireHOL (firewall config creator and manager)
  • wpsik (WPS scan and attack tool)
  • USBleach (disarms harmful USB storage)
  • opensvp (firewall testing tool)
  • The Sleuth Kit (toolkit for forensics)
  • MongoSanitizer (defense against MongoDB injection attacks)
  • YASAT (local security scanner)
  • Nmap (network and vulnerability scanner)
  • dnsteal (exfiltration tool via DNS requests)
  • pastemon (tool to monitor Pastebin)
  • BDA (vulnerability scan for Hadoop and Spark)
  • Scirius (Suricata rule management)
  • Spaghetti (web vulnerability scanner)
  • Suricata (network IDS, IPS and monitoring)
  • CIRCLean (USB stick and drives cleaner)
  • King Phisher (Phishing campaign toolkit)
  • Termineter (smart meter security framework)
  • pick (password manager)
  • jak (git encryption)
  • detectem (software enumeration)