🛡️⚔️ 🔐 SecOps Toolkits
A comprehensive collection of security tools for Blue Team and Red Team operations. Choose from our categorized tools to meet your cybersecurity needs with our searchable directory.
How to use this index: Use the navigation sidebar to jump between Blue Team and Red Team categories with their subcategories, or search for specific tools using the search bar. Each tool is tagged with relevant keywords for easier discovery.
🛡️ Blue Team (Defensive Security)
Tools for monitoring, detecting, and responding to security incidents to protect your organization's assets.
🛡️ Blue Team: Threat Intelligence & Intel
Platforms and tools that provide intelligence on threats, indicators, and attack patterns.
Malware Analysis & Scanning
VirusTotal
Visit ToolHybrid Analysis
Visit ToolMalAPI
Visit ToolMTA Intelligence
Visit ToolCAPEv2
Visit ToolFileSec
Visit ToolIoCs & Threat Feeds
AlienVault OTX
Visit Toolabuse.ch
Visit ToolThreatConnect
Visit ToolReconnaissance
Shodan
Visit ToolCensys
Visit ToolEmail Security & Forensics
MXToolbox Email Header Analyzer
Visit ToolSublime EML Analyzer
Visit ToolEML Wrap
Visit ToolMail-Tester
Visit Tool🛡️ Blue Team: Network Security
Tools for capturing, analyzing, and monitoring network traffic to identify malicious activity.
Network Traffic Analysis & Monitoring
Tools for capturing, analyzing, and monitoring network traffic to identify malicious activity.
Traffic Analysis & Monitoring
Wireshark
Visit ToolTcpdump
Visit ToolNetworkMiner
Visit ToolNetflow Analyzer
Visit ToolIntrusion Detection & Prevention
Snort
Visit ToolSuricata
Visit ToolOSSEC
Visit ToolZeek (Bro)
Visit ToolEndpoint Security
Tools for monitoring and responding to security events on endpoints like workstations and servers.
EDR & SIEM
Elastic Security
Visit ToolSplunk Enterprise Security
Visit ToolHost Monitoring
OSQuery
Visit ToolSysmon
Visit ToolVulnerability Management
Tools for identifying and assessing security vulnerabilities in systems and applications.
General Vulnerability Scanners
Rapid7 Nexpose
Visit ToolTenable Nessus
Visit ToolQualys
Visit ToolOpenVAS
Visit ToolDependency & Code Scanning
Retire.js
Visit ToolSnyk
Visit ToolAuditJS
Visit ToolThreat Intelligence
Platforms and tools that provide intelligence on threats, indicators, and attack patterns.
Malware Analysis & Scanning
VirusTotal
Visit ToolHybrid Analysis
Visit ToolMalAPI
Visit ToolMTA Intelligence
Visit ToolCAPEv2
Visit ToolIoCs & Threat Feeds
AlienVault OTX
Visit Toolabuse.ch
Visit ToolThreatConnect
Visit ToolReconnaissance
Shodan
Visit ToolCensys
Visit Tool🛡️ Blue Team: Incident Response & Forensics
Tools and frameworks for responding to security incidents and managing breach response activities.
Incident Response
Tools and frameworks for responding to security incidents and managing breach response activities.
Forensic Analysis
Timesketch
Visit ToolOSDFCon
Visit ToolMonitoring & Alerting
Security Monkey
Visit ToolThreatIngestor
Visit Tool🛡️ Blue Team: DevSecOps & Infrastructure Security
Tools for integrating security into development processes and securing infrastructure.
Container & Infrastructure Security
Tools for securing containers, infrastructure as code, and deployment pipelines.
Container Security
Trivy
Visit ToolAnchore Engine
Visit ToolCI/CD Security
secureCodeBox
Visit ToolSAST Scan
Visit Tool⚔️ Red Team (Offensive Security)
Tools for penetration testing, vulnerability assessment, and red team exercises to identify security weaknesses.
⚔️ Red Team: Web Application Testing
Tools for identifying and exploiting web application vulnerabilities.
Scanning & Crawling
Nikto
Visit ToolNikto Web Scanner
Visit ToolBlackWidow
Visit ToolNuclei
Visit ToolKatana
Visit ToolProxy & Interception
Burp Suite
Visit ToolOWASP ZAP
Visit ToolSpecialized Testing
SQLMap
Visit ToolWPScan
Visit ToolDalfox
Visit ToolSmuggler
Visit Tool⚔️ Red Team: Cloud Security Testing
Tools for testing security in cloud environments and identifying misconfigurations.
Cloud Platform Testing
Prowler
Visit ToolAWS Pwn
Visit ToolPacu
Visit ToolCloudHunter
Visit Tool⚔️ Red Team: Network & Infrastructure Testing
Tools for scanning networks, identifying services, and exploiting network-based vulnerabilities.
Network Scanning & Enumeration
Nmap
Visit ToolMasscan
Visit ToolWhatWeb
Visit ToolHttprobe
Visit ToolPassword Auditing
John the Ripper
Visit ToolHashcat
Visit ToolAircrack-ng
Visit ToolHydra
Visit ToolExploitation & Post-Exploitation
Metasploit
Visit ToolPowerSploit
Visit ToolCovenant
Visit ToolImpacket
Visit ToolPenetration Testing Frameworks
Comprehensive frameworks for conducting penetration tests and exploiting vulnerabilities.
Metasploit
Visit ToolMetasploitable3
Visit ToolWeb Application Testing
Tools for identifying and exploiting web application vulnerabilities.
Scanning & Crawling
Nikto
Visit ToolNikto Web Scanner
Visit ToolBlackWidow
Visit ToolNuclei
Visit ToolKatana
Visit ToolProxy & Interception
Burp Suite
Visit ToolOWASP ZAP
Visit ToolSpecialized Testing
SQLMap
Visit ToolWPScan
Visit ToolDalfox
Visit ToolSmuggler
Visit ToolNetwork & Infrastructure Testing
Tools for scanning networks, identifying services, and exploiting network-based vulnerabilities.
Network Scanning & Enumeration
Nmap
Visit ToolMasscan
Visit ToolWhatWeb
Visit ToolHttprobe
Visit ToolPassword Auditing
John the Ripper
Visit ToolHashcat
Visit ToolAircrack-ng
Visit ToolHydra
Visit ToolExploitation & Post-Exploitation
Tools for exploiting vulnerabilities and maintaining access after initial compromise.
Exploitation Frameworks
PowerSploit
Visit ToolCommand & Control (C2)
Empire
Visit ToolCovenant
Visit ToolActive Directory & Network Protocols
Certify
Visit ToolImpacket
Visit Tool🔐 General Security Tools
Tools that apply to both offensive and defensive operations, including forensics, cryptography, and infrastructure security.
Digital Forensics
Tools for collecting, preserving, and analyzing digital evidence.
Disk & File Analysis
Sleuth Kit
Visit ToolAutopsy
Visit ToolSIFT Workstation
Visit ToolFileSec
Visit ToolMemory Analysis
Volatility
Visit ToolCryptography & Certificates
Tools for testing cryptographic implementations, certificate validation, and encryption.
SSL Labs SSL Test
Visit ToolCertificate Transparency Log
Visit ToolOpenSSL
Visit ToolKeybase
Visit ToolDevSecOps & Infrastructure Security
Tools for integrating security into development processes and infrastructure.
Container & Infrastructure Security
Trivy
Visit ToolAnchore Engine
Visit ToolCartography
Visit ToolCI/CD Security
secureCodeBox
Visit ToolSAST Scan
Visit ToolCloud Security
Tools for securing cloud infrastructure and identifying misconfigurations in cloud environments.