Offensive Security Tools

Red Team • Penetration Testing • Exploitation

🔍

Nmap

Network reconnaissance and enumeration tool for discovering hosts, services, and vulnerabilities.

Reconnaissance
🕷️

Burp Suite

Industry-standard web application security testing platform for identifying and exploiting vulnerabilities.

Web Application Attacks
💉

SQLmap

Automated SQL injection and database takeover tool for exploiting SQL vulnerabilities.

Database Exploitation
💣

Metasploit

Comprehensive exploitation framework for developing and executing exploit code against targets.

Exploitation Framework
🔎

Nikto

Web server scanner for detecting dangerous files, outdated software, and misconfigurations.

Web Server Scanning
🔨

Hydra

Fast and flexible network authentication cracker supporting numerous protocols.

Brute Force Attacks
📂

Gobuster

High-performance directory and DNS enumeration tool written in Go.

Directory Enumeration

ffuf

Fast web fuzzer for discovering hidden paths, parameters, and vulnerabilities.

Web Fuzzing
🔓

John The Ripper

Powerful password cracking tool supporting various hash formats and attack modes.

Password Cracking
🪟

Enum4linux

Windows and Samba enumeration tool for extracting information via SMB protocol.

SMB Enumeration

Defensive Security Tools

Blue Team • SOC • Incident Response

🦈

Wireshark

Industry-leading network protocol analyzer for deep packet inspection and traffic analysis.

Network Analysis
📊

Splunk

Enterprise SIEM platform for collecting, analyzing, and visualizing security data.

Log Analysis & SIEM
🔍

ELK Stack

Elasticsearch, Logstash, and Kibana for centralized logging and real-time analysis.

Centralized Logging
🛡️

Wazuh

Open-source security monitoring platform with HIDS capabilities and threat detection.

Host-based IDS
🚨

Suricata

High-performance network IDS/IPS engine with multi-threading capabilities.

Network IDS/IPS
👁️

Zeek

Powerful network security monitoring framework for detecting suspicious activity.

Network Monitoring
💻

Sysmon

Windows system monitoring tool providing detailed logging of process and network activity.

Endpoint Visibility
🔒

OSSEC

Host-based intrusion detection system for log analysis and file integrity monitoring.

Host Monitoring
🦠

VirusTotal

Multi-scanner service for analyzing suspicious files, URLs, and identifying malware.

Malware Analysis
🐝

TheHive

Scalable incident response platform for security operations centers.

Incident Response

Linux Operations Core

Command Line • Scripting • Automation • Tool Chaining

Why Linux is Essential

Linux is the foundation of modern cybersecurity operations. It provides the environment where offensive and defensive tools operate, scripts are developed, and automation is implemented.

⚙️ Daily Operations
📝 Bash Scripting
🤖 Process Automation
🔗 Tool Chaining
🔧 System Administration
🌐 Network Configuration