Tools & Tech

A curated collection of essential tools, privacy services, and hardware recommendations for cybersecurity professionals and privacy-conscious users.


Penetration Testing Tools

Reconnaissance & Enumeration

Nmap

  • Purpose: Network scanning and service enumeration
  • Website: https://nmap.org
  • Usage: nmap -sC -sV -oA output target.com
  • Key Features: Port scanning, OS detection, service version detection

Masscan

Amass

  • Purpose: Subdomain enumeration and network mapping
  • Website: https://github.com/OWASP/Amass
  • Usage: amass enum -d target.com
  • Key Features: OSINT gathering, DNS enumeration, comprehensive mapping

FFuF

  • Purpose: Web fuzzer for directory and parameter discovery
  • Website: https://github.com/ffuf/ffuf
  • Usage: ffuf -u https://target.com/FUZZ -w wordlist.txt
  • Key Features: Fast, flexible, customizable fuzzing

Web Application Testing

Burp Suite

  • Purpose: Web application security testing platform
  • Website: https://portswigger.net/burp
  • Editions: Community (free), Professional (paid)
  • Key Features: Proxy, scanner, intruder, repeater, decoder

OWASP ZAP

  • Purpose: Free alternative to Burp Suite
  • Website: https://www.zaproxy.org
  • Usage: GUI or CLI-based web app scanning
  • Key Features: Automated scanning, manual testing tools, API

SQLMap

  • Purpose: Automated SQL injection detection and exploitation
  • Website: https://sqlmap.org
  • Usage: sqlmap -u "http://target.com/page?id=1" --dbs
  • Key Features: Database fingerprinting, data extraction, shell access

Nikto

  • Purpose: Web server vulnerability scanner
  • Website: https://cirt.net/Nikto2
  • Usage: nikto -h https://target.com
  • Key Features: 6700+ potential dangerous files/programs

Exploitation Frameworks

Metasploit Framework

  • Purpose: Penetration testing and exploitation framework
  • Website: https://www.metasploit.com
  • Usage: msfconsole
  • Key Features: 2000+ exploits, payloads, auxiliary modules

Cobalt Strike

  • Purpose: Advanced adversary simulation platform
  • Website: https://www.cobaltstrike.com
  • Note: Commercial tool, requires license
  • Key Features: Command & control, post-exploitation, team server

Password Attacks

Hashcat

  • Purpose: Advanced password recovery tool
  • Website: https://hashcat.net/hashcat
  • Usage: hashcat -m 1000 -a 0 hashes.txt wordlist.txt
  • Key Features: GPU acceleration, 300+ hash types

John the Ripper

  • Purpose: Password cracking software
  • Website: https://www.openwall.com/john
  • Usage: john --wordlist=rockyou.txt hashes.txt
  • Key Features: Auto-detection, custom rules, community patches

Hydra

Wireless Security

Aircrack-ng

  • Purpose: WiFi security auditing suite
  • Website: https://www.aircrack-ng.org
  • Components: airodump-ng, aireplay-ng, aircrack-ng
  • Key Features: Packet capture, WEP/WPA cracking

Kismet


Privacy & Security Services

VPN Services

Mullvad VPN

  • Website: https://mullvad.net
  • Privacy: No email required, anonymous payment options
  • Cost: €5/month
  • Features: WireGuard support, no logs, port forwarding

ProtonVPN

  • Website: https://protonvpn.com
  • Privacy: Swiss-based, open source, no-logs audited
  • Cost: Free tier available, paid plans from $5/month
  • Features: Secure Core, Tor over VPN, NetShield

IVPN

  • Website: https://www.ivpn.net
  • Privacy: No email required, anonymous accounts
  • Cost: $6/month
  • Features: WireGuard, multi-hop, port forwarding

Email Services

ProtonMail

  • Website: https://proton.me/mail
  • Privacy: End-to-end encrypted, Swiss privacy laws
  • Cost: Free tier, paid from $4.99/month
  • Features: Zero-access encryption, custom domains

Tutanota

  • Website: https://tutanota.com
  • Privacy: Open source, encrypted email, German-based
  • Cost: Free tier, paid from €3/month
  • Features: Encrypted calendar, contacts, custom domains

Password Managers

Bitwarden

  • Website: https://bitwarden.com
  • Privacy: Open source, self-hostable
  • Cost: Free tier, premium $10/year
  • Features: Cross-platform, password generator, 2FA support

KeePassXC

  • Website: https://keepassxc.org
  • Privacy: Fully offline, open source
  • Cost: Free
  • Features: Local database, browser integration, TOTP

1Password

  • Website: https://1password.com
  • Privacy: Zero-knowledge architecture
  • Cost: $2.99/month personal
  • Features: Travel mode, item sharing, watchtower

Encrypted Messaging

Signal

  • Website: https://signal.org
  • Privacy: End-to-end encryption, open source
  • Cost: Free
  • Features: Disappearing messages, sealed sender

Element (Matrix)

  • Website: https://element.io
  • Privacy: Decentralized, open source
  • Cost: Free
  • Features: Federation, bridges to other services

DNS Services

NextDNS

  • Website: https://nextdns.io
  • Privacy: Configurable DNS filtering, analytics
  • Cost: Free tier 300k queries/month, $1.99/month unlimited
  • Features: Ad blocking, malware protection, parental controls

Quad9

  • Website: https://www.quad9.net
  • Privacy: No logging, threat blocking
  • Cost: Free
  • Features: DNSSEC validation, malware blocking

Hardware Recommendations

Security Keys

YubiKey 5 Series

Nitrokey

OnlyKey

  • Manufacturer: CryptoTrust
  • Website: https://onlykey.io
  • Cost: $48-68
  • Features: Self-destruct PIN, password manager, open source

Penetration Testing Hardware

WiFi Pineapple

  • Manufacturer: Hak5
  • Website: https://shop.hak5.org
  • Models: WiFi Pineapple Mark VII
  • Cost: $99-299
  • Use Case: Wireless auditing, MITM attacks

Flipper Zero

  • Manufacturer: Flipper Devices
  • Website: https://flipperzero.one
  • Cost: $169
  • Use Case: Multi-tool for pentesters, RFID, NFC, infrared

Hak5 USB Rubber Ducky

  • Manufacturer: Hak5
  • Website: https://shop.hak5.org
  • Cost: $79.99
  • Use Case: Keystroke injection, physical access testing

LAN Turtle

  • Manufacturer: Hak5
  • Website: https://shop.hak5.org
  • Cost: $59.99
  • Use Case: Network implant, covert remote access

Privacy-Focused Hardware

Purism Librem Laptops

  • Manufacturer: Purism
  • Website: https://puri.sm
  • Cost: $1,399+
  • Features: Kill switches, PureOS, coreboot

System76 Laptops

  • Manufacturer: System76
  • Website: https://system76.com
  • Cost: $849+
  • Features: Pop!_OS, coreboot, open firmware

Pine64 PinePhone

  • Manufacturer: Pine64
  • Website: https://www.pine64.org
  • Cost: $149-199
  • Features: Hardware kill switches, Linux mobile OS

Operating Systems

Security-Focused Distributions

Kali Linux

  • Purpose: Penetration testing and security auditing
  • Website: https://www.kali.org
  • Base: Debian
  • Tools Included: 600+ security tools pre-installed

Parrot Security OS

  • Purpose: Security testing and digital forensics
  • Website: https://www.parrotsec.org
  • Base: Debian
  • Features: Lightweight, privacy-focused

BlackArch Linux

  • Purpose: Penetration testing and security research
  • Website: https://blackarch.org
  • Base: Arch Linux
  • Tools Included: 2800+ tools

Privacy-Focused Distributions

Tails

  • Purpose: Anonymous web browsing and communication
  • Website: https://tails.boum.org
  • Base: Debian
  • Features: Tor routing, amnesia on shutdown

Qubes OS

  • Purpose: Security through compartmentalization
  • Website: https://www.qubes-os.org
  • Base: Fedora/Debian
  • Features: Security by isolation, Xen hypervisor

Whonix

  • Purpose: Anonymous operating system
  • Website: https://www.whonix.org
  • Base: Debian
  • Features: Tor integration, leak protection

Browser Extensions

Privacy & Security

uBlock Origin

Privacy Badger

HTTPS Everywhere

NoScript


Additional Resources

Learning Platforms

Communities

  • Reddit: /r/netsec, /r/privacy, /r/cybersecurity
  • Discord: Various security-focused servers
  • Twitter: #infosec, #cybersecurity

Last Updated: March 2025

Note: Always verify the legitimacy of tools and services before use. Prices and features are subject to change.