Cyber Security

This page contains a list of tools and other random resources that I have used during my study for CEH exam. Tools are documented from various sources and in no way the most comprehensive list of tools that you can find. This page is mainly for my own personal reference and I hope some of you may find it useful. Please understand how to use the tools ethically when you have absolute permission to test a system. Please do not any any of the resources for any unethical use.

Metadata: Exif Tool

New Recon Tools:

  • SpiderFoot –
  • Harvester –
  • Discover –
  • Recon-ng

Source Code analyzers:

  • Flaw finder – Flawfinder is a program that examines C source code and reports possible security weaknesses (“flaws”) sorted by risk level. It’s very useful for quickly finding and removing some security problems before a program is widely released.
  • Rough Auditing Tool for Security – – scans various languages, including C, C++, Perl, PHP and Python.
  • StackGuard – buffer overflow
  • Libsafe – buffer overflow protection.

Application Vulnerability Scanning Tools:

  • Whisker: Needs perl
  • N-Stelth: GUI Based –,  rates vulnerabilities as high, medium or low.
  • Nikito
  • ZAP

Exploitation Tools

  • metasploit
  • Exploitation Framework
  • Core Impact

System Vulnerability Scanner:

  • Nessus
  • Retina
  • OpenVAS
  • LAN Guard


 Logging Tools:

  • Nlog-

SNMP Scanning Tools:

  • SNScan – SNScan is a Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network.
  • SNMP Util –

Immutable Infrastructure

  • read only containers
  • read only VMs




  • Proxy Switcher ( – Proxy Switcher – surf anonymously
  • Proxy Workbench ( – Proxy Workbench is a proxy server unlike all others. It is unique because all of the data passing through it is displayed in real time, you can drill into particular TCP/IP connections, view their history, save the data to a file and view the socket connection diagram.
  • ProxyChains (
  • CyberGhost (
  • Proxifier (

Trace Route tools:

  • Visual Route / Neo Trace
  • Trout
  • Magic NetTrace
  • Network Pinger – This tool has one of the coolest IP Calculator!
  • Geo Spider – GEO Spider helps you to trace, identify and monitor your network activity on world map.
  • Ping Plotter – PingPlotter helps solve network problems.

Useful Resources for Information Gathering

  1. EDGAR:
  2. D&B Hoovers offers dynamic search and list-building capabilities, real-time trigger alerts, comprehensive company profiles, and valuable research and technology reports to help sellers get in the door first.
  3. legal solutions, news & business insights.
  4. Business News:

LDAP Enumeration

  • Softerra (
  • JXplorer (
  • Lex (
  • LDAP Admin Tool (

NTP Enumeration Tools

  • NTP Server Scanner (
  • AtomSync (

Data Breach Index:


Company Plans and Financials:

  • SEC Info (
  • Experian (
  • Market Watch (
  • Wall Street Monitor (
  • Euromonitor (
  • Site Stat:
  • Stock performance:

Web Crawlers and Spiders:

  • Pavuk is a multifunctional open source web grabber –
  • Black Widow
  • NCollector Studio: download content from the web to your computer.
  • GSA Email Spider: Collect and extract emails, phone and fax numbers from the websites around the world using the keywords you enter for!
  • GNU WGet
  • Webripper 2

The Robin Sage Saga


The Curious Case of David Ritz

  • Punishment for WHOIS and DNS queries!

Google Hacking Masterlist


Exploitation Frameworks:

  1. Metaspolit
  2. Core Impact
  3. Canvas

SHEEP DIP Computer – isotalted from the network

  • – can be used for malware analysis.
  • Process Explorer –

Use in isolated lab to test virus/worms:

  • JPS Virus Maker
  • Internet worm maker thing
  • Ghost eye social media worm toolkit

Email Harvest:

  • theharvestor – pre-installed in Kali.

Zone Transfer:

  • Fierce – preinstalled in Kali

Foot printing:

– hackingforcharity Google hacking Database

Best Google Hack: ext:pdf jonny long google hack

People Search


Website Copier

  • – web ripper 2
  • WinWSD – Website Downloader (search on google)

Saving Websites

  • wget –recursive –depth=20

Email Tracking

  • -gmail and outlook
  • – completely free

Network Discovery

  • Find IP and subnets
  • Find OS – NMAP
  • Find routing information

NMAP Commands

  • nmap -sP ipaddress/24 (Ping Scan/ Ping Sweep)
  • nmap -sT ip-addr [ this is TCP OPEN scan]
  • nmap -sT -p 1-3000 -P0 ip-addr [ -p is used to specify range of port, -P0 is used to not send ping packets to hosts]

PING using different utilities
ping –f –l 1300
nmap –sP –v
hping3 -1

Firewall in between?
hping3 -c 1 -V -p 80 -s 5050 -A

Send an ACK Packet to a designated port
hping3 -A -p 80

Create a SYS Scan
hping3 -8 50-560 –s -v

nmap -sP -PE -PA21,23,80,3389

Create a packet with FIN, URG, and PSH flags set and send it to port 80 on the victim
hping3 –F –P -U -p 80

Nmap Full Open Scan (Connect Scan)
nmap –sT <ip address or range>

Nmap Half open scan
nmap -sS ip

Nmap Xmas SCAN
nmap -sX ip

Packet fragment in nmap:
nmap –sS –T4 –A –f –v <target IP address>

Results of UDP scanning against closed and open portsPort statusResultOpenNo responseClosedICMP “Port Unreachable” message returned

Common Fingerprinting techniques
Common techniques are based on analyzing the following:
IP TTL values
IP ID values
TCP Window size
TCP options (generally, in TCP SYN and SYN+ACK packets)
DHCP requests
ICMP requests
HTTP packets (generally, the User-Agent field)
Running services
Open port patterns

Active Fingerprinting:
nmap -O <ip address>

One Linux-based tool for passive fingerprinting is p0f

To detect ICMP ping sweep in Wireshark: icmp.type==8 or icmp.type==0
TCP ping sweep: tcp.dstport==7
UDP ping sweep: udp.dstport==7

To get SYN, SYN+ACK, RST & RST+ACK tcp.flags==0x002 or tcp.flags==0x012 or tcp.flags==0x004 or tcp.flags==0x014
To get ICMP type 3 Packet with Code 1,2,3,9,10, or 13 Packet
icmp.type==3 and (icmp.code==1 or icmp.code==2 or icmp.code==3 or icmp.code==9 or icmp.code==10 or icmp.code==13)

Xprobe: Linux utility to retrieve information about a system.
p0f: Another Linux utility that analyzes the realtime traffic passing back and forth from client to server.

Mask the server information:

  • IIS Lockdown, ServerMask,

Footprinting: IP address ranges, Namespaces, Employee information, Phone numbers, Facility information, Job information

  • Scanning: Pings, Ping sweeps, Port scans, Tracert


PsExec – execute processes remotely
PsFile – shows files opened remotely
PsGetSid – display the SID of a computer or a user
PsInfo – list information about a system
PsPing – measure network performance
PsKill – kill processes by name or process ID
PsList – list detailed information about processes
PsLoggedOn – see who’s logged on locally and via resource sharing (full source is included)
PsLogList – dump event log records
PsPasswd – changes account passwords
PsService – view and control services
PsShutdown – shuts down and optionally reboots a computer
PsSuspend – suspends processes
PsUptime – shows you how long a system has been running since its last reboot

System Hacking

Man In The Middle (MITM) Tool examples

  • SSL Strip
  • Burp Suite
  • Browser Exploitation Framework (BeEF)

Regional Internet Registries (RIRs)


Network Scanners

  • nmap -sP — sP = Scan Type Ping
  • Angry IP Scanner – Cross Platform tool!
  • Colasoft Ping Scanner –
  • PingInfoView – Windows OS only. Supports most newer versions of Windows including windows 10.
  • SolarWinds Engineering Tool-set – Pro
  • Packet Trap remote monitoring and management –
  • Pinkie Network Troubleshooting Tool –
  • What’s Up Gold Network Scanner –
  • Serversniff: for networking, server checks and routing with many many little toys and tools for administrators, webmasters, developers, power users and security-aware users for networking, server checks and routing with many many little toys and tools for administrators, webmasters, developers, powerusers und security-aware users –
  • PathAnalyzer Pro – has a free and a pro version. path discovery, whois, firewall detection, geolocation, network testing
  • Curr Ports:

Packet Crafting

  • HPing – now available from Github @
  • Colasoft Packet Builder: [nables creating custom network packets; users can use this tool to check their network protection against attacks and intruders.]

Search Web

  • Search web by domain: [Netcraft also publishes market research on web servers]
  • Shodan: Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters.

Visual Traceroute

  • Open Visual Trace-route – [Open source cross-platform (Windows/Linux/Mac) Java Visual Traceroute, packet sniffer and Whois. Data is displayed in a 3D or a 2D map component.]
  • Visual Route (not free)
  • Or simply use traceroute in Linux or tracert in windows

Network Commands:

  • nmcli -p
  • dig any
  • whois

War Dialing:

  • Toneloc –
  • NIKSUN’s PhoneSweep –; audit telephone system

Digital Forensics

  • Maltego (not free)- Maltego is proprietary software[1] used for open-source intelligence and forensics.
  • (not free)- Domain Name Analyzer Professional is an advanced Windows software for finding, managing, maintaining multiple domain names.
  • (not free) – Web Data Extractor Pro is a web scraping tool specifically designed for mass-gathering of various data types. It can harvest URLs, phone and fax numbers, email addresses, as well as meta tag information and body text. Special feature of WDE Pro is custom extraction of structured data.
  • Robtex – Robtex is used for various kinds of research of IP numbers, Domain names, etc – – user this to gather a lot of domain related information without running command line tools.
  • DNS Digger –
  • Sam Spade (Windows only) is a general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment. Sam Spade fetures include:
    ping – nslookup – whois – IP block – dig – traceroute finger – SMTP VRFY – web browser keep-alive – DNS zone transfer – SMTP relay check – Usenet cancel check – website download – website search – email header analysis – Email blacklist – query Abuse address – And More.
  • – has many tools, free to download. I need to explore them more!
  • Dig Web Interface – a web based UI for dig utility –

Useful Resources:

  1. AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.
  2. Most useful Caesar Cipher Decoder.
  3. A1Z26 Cipher coder/decoder: A1Z26 is very simple direct substitution cypher, where each alphabet letter is replaced by its number in the alphabet.
  4. Best ASCII Converter:
  5. Best Hash and Password Cracking online:
  6. Always remember to check AtBash and Base32 deciphers. Base32 is not available at Rumkin. Use this url for additional deciphers that are not available on Rumkin.
  7. Best Decipher library online:
  8. Check File Type Online:
  9. URL Param Encoder/Decoder:
  10. Magic Bytes:
  11. Recon tool based on URL: and – useful to find out OS of a server.
  12. Online Recon IP Scan:
  13. Blowfish

Recon command: host (linux)

Vulnerability Research:

Number Converters – Cryptography:

  • Hex to ASCII. Do not convert 0x!!
  • Base64Decode – common crypto problem:
  • Binary 2 ASCII converter
  • tips: Some crypto problem involves multiple encoding. A very common method is to encode with base64 then encode with binary. For example, the word “supersecret” becomes “c3N1cGVyc2VjcmV0” after applying base64 encoding. We can then encode it to binary using the wensite “ So, the final encoded value becomes 01100011 00110011 01001110 00110001 01100011 01000111 01010110 01111001 01100011 00110010 01010110 01101010 01100011 01101101 01010110 00110000. To solve such problems, we must run decoder twice to get to the original value.
  • Atbash Decoder: When nothing works, try using this decoder.  As a matter of fact, we should always try this one.
  • Vigenere Decoder: If you have a secret code (key) and an encrypted message, try


Digital Invisible Toolkit:

Pcap Analysis:

Foot-printing – Routing path analysis –

DNS Information:

  • dig ANY
  • nslookup
  • whois -> provides a lot of information.

Discover Open ports

  • nmap
  • hping

Ping and Ping Sweep

  • Ping tool for one host
  • Ping sweep for many hosts: nmap -sP

IP Scanners

Network Emulators:

Many excellent free Security tools:

750 CISSP Questions for Review on Youtube:

Check you password Strength:

Ethical Hacking Tools

  • Recon tool: people search pipl
  • Domain info research – nslookup. There are many options that can be passed to this command line tool that is available in windows, linux and mac.
  • Path Analyzer pro – traceroute finally makes sense:

SSL Server Test:   test the SSL certificate of any website of your choice.

AES Encryption Options:  try out various encryption with this excellent windows utility. Windows 10 compatible.

Download Linux Distros:

Download Windows Software:

Google Hack: inurl * -inurl:www -inurl:support*


Kali Linux

  • dmitry – deepmagic information gathering tool – good recon tool with some nice flags
  • goofile – another tool to search for specific file types
  • Maltego – most advanced recon tool! Just use the community edition!


 3,964 total views,  1 views today