Linux Security Tools
Comprehensive reference of 96 offensive security tools for Linux, organized into 12 categories. From network reconnaissance to exploitation and reporting, these tools form the foundation of modern penetration testing.
Ethical Use Only
These tools are intended for authorized security testing, CTF competitions, and educational purposes only. Always obtain proper written authorization before testing systems you do not own. Unauthorized access to computer systems is illegal in most jurisdictions.
Categories Overview
Reconnaissance
11 toolsInformation gathering and network discovery tools for mapping attack surfaces and identifying targets.
Network scanner & security auditor
Web reconnaissance framework
E-mail, subdomain, and name harvester
Nmap GUI frontend
DNS enumeration script
Active/passive ARP reconnaissance
OSINT and graphical link analysis
Asynchronous stateless TCP scanner
Passive OS fingerprinting
Mass IP port scanner
Fast single-packet network scanner
Password & Brute Force
11 toolsPassword cracking, brute force attack, and credential testing tools for security assessments.
Password security auditing tool
GPU-accelerated password recovery
Network login brute forcer
Wordlist generator
Parallel network login auditor
Rainbow table password cracker
Custom wordlist generator from websites
Multi-purpose brute-forcer
Windows password cracker using rainbow tables
Brute force tool supporting protocols like RDP
ZIP password cracker
Vulnerability Scanning
5 toolsAutomated vulnerability detection and assessment tools for identifying security weaknesses.
Network Attacks
8 toolsNetwork traffic analysis, interception, and attack tools for testing network security.
Exploitation
17 toolsExploit development, delivery, and execution tools for penetration testing engagements.
Penetration testing framework
Automatic SQL injection tool
Exploit development toolkit
SQL Server exploitation toolkit
Pentest tools framework
Java-based SQL injection tool
Metasploit GUI frontend
Browser exploitation framework
Router exploitation framework
Shellcode writing toolkit
Java deserialization exploit generator
ROP gadget finder
Command injection exploitation tool
Public exploit database
CTF framework and exploit library
CLI for Exploit-DB
Cross-site scripting framework
Post-Exploitation
9 toolsTools for maintaining access, privilege escalation, and lateral movement after initial compromise.
Post-exploitation PowerShell/Python agent
Cross-platform remote administration tool
Active Directory relationship mapper
Windows credential extraction
DNS-based C2 channel
Windows post-exploitation rootkit
Metasploit advanced payload
Privilege escalation checker
Post-exploitation platform
Wireless Attacks
7 toolsTools for auditing wireless network security including Wi-Fi, Bluetooth, and RF protocols.
Web App Testing
5 toolsWeb application penetration testing tools for finding and exploiting web vulnerabilities.
Mobile Security
10 toolsMobile application security testing tools for Android and iOS platforms.
Android security assessment framework
Android application analysis
Dynamic instrumentation toolkit
Mobile security framework
OWASP mobile application security testing
Kali Linux mobile penetration testing
Android security VM
Android APK reverse engineering
Android malware scoring system
Network, WiFi, and BLE reconnaissance
Reverse Engineering
3 toolsBinary analysis, disassembly, and reverse engineering tools for malware analysis and exploit research.
Reporting
6 toolsVulnerability management, documentation, and reporting tools for professional security assessments.
Social Engineering
4 toolsSocial engineering and phishing simulation tools for testing human-factor security.
Social-Engineer Toolkit
Phishing simulation platform
Phishing campaign toolkit
Phishing awareness platform