Tools starting with T
A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z
Looking for new tools to extend your tool box? The top 100 list of best security tools is a great start.
TANNER is the 'brain' of the SNARE tool. It evaluates its events and alters the responses to incoming requests depending on the type of attacks.
Latest release: 0.5 [Jan. 30, 2018]
Termineter is a security framework to test smart meters. It can be used for development purposes or to test the security of supported devices.
Latest release: 1.0.2 [Jan. 27, 2018]
testssl.sh is a command line tool which checks a system on any port for the support of TLS/SSL ciphers, protocols, as well as some cryptographic flaws.
Latest release: 2.9.5.post1 [Sept. 20, 2017]
THC Hydra (thc-hydra)
THC Hydra is a brute-force cracking tool for remote authentication services. It supports many protocols, including telnet, FTP, LDAP, SSH, SNMP, and others.
Latest release: 8.6 [July 21, 2017]
THC IPv6 Attack Toolkit (thc-ipv6)
THC IPv6 attack toolkit a set of utilities. It can be used for penetrating testing and security assessments of correct network implementations.
Latest release: 3.4 [Jan. 4, 2018]
theHarvester is a tool to gather email accounts, subdomains, virtual hosts, open ports, banners, and employee names. It uses different public sources.
The Sleuth Kit is a toolkit to investigate disk images and do forensic analysis on them.
Latest release: sleuthkit-4.5.0 [Oct. 16, 2017]
ThreatPinch is a Chrome extension to perform information lookups on data artifacts like domain names, hashes, IP addresses, and more.
Thug is a low-interaction honeyclient to test for client-side attacks. It mimics a client application, like a web browser and sees if attack code is fired.
Latest release: 0.9.17 [Feb. 12, 2018]
Tiger a security audit and intrusion detection tool for flavors of Unix
TLS-Attacker is a framework to analyze TLS libraries. It is written in Java and developed by the Ruhr University Bochum and Hackmanit GmbH.
Latest release: 2.4 [Feb. 9, 2018]
The CLI tool tlsenum attempts to enumerate what TLS cipher suites a server supports and then list them in order of priority.
Trawler is a platform for ingesting user phishing reports, processing, triage, and response. It provides a web interface to work the collected data.
Tulpar is a security tool to scan web targets for possible vulnerabilities. It checks a wide range of items and attack types for this particular purpose.
- Heralding (honeypot to catch credentials)
- ZGrab (banner grabbing tool)
- testssl.sh (TLS/SSL configuration scanner)
- WhatWeb (website fingerprinter)
- vallumd (distributed ipset blacklist for iptables)
- Nikto (web application scanner)
- sslcaudit (auditing tool for SSL/TLS clients)
- SCUTUM (ARP filtering)
- VHostScan (virtual host scanner)
- OpenSSL (TLS and SSL toolkit)
- SSHsec (SSH configuration scanner)
- not24get (password quality checker)
- swap_digger (data excavation tool for Linux swap)
- Trawler (data collection framework for phishing results)
- VulnFeed (vulnerability feed parser)
- Metagoofil (information gathering tool)
- Certigo (certificate validator tool)
- Exploit Pack (penetration testing framework)
- Oscanner (Oracle assessment framework)
- Dionaea (honeypot)
- Kube-Bench (security benchmark testing for Kubernetes)
- Thug (low-interaction honeyclient)
- NoSQLMap (database enumeration and exploitation)