- CrypTool, Cryptol, CryptoBench - Cryptanalysis
- VeraCrypt, Symantec Drive Encryption, AxCrypt - Disk Encryption
- Advanced Encryption Package 2017, BCTextEncoder, keyczar - Cryptographic toolkit
- MD5 Calculator, HashCalc, Hashtool - Hashing
- CryptoForge - File and Text Encryption
- inSSIDer, Net Surveyor, Acrylic Wifi Home - Scanning
- WiGLE, Skyhook, Maptitude, GPSVisualizer, TracMaker - GPS Mapping
- Wireshark, Steel Central Packet Analyzer, OmniPeek, Commview - Packet Sniffers
- Ekahau Spectrum Analyzer - Spectrum Analysis
- Aircrack-ng, Cain and Abel, Elcomsoft Wireless Security Auditor, coWPAtty, Reaver Pro II, wifite2, bully - Password Cracking
- Cisco Adaptive Wireless IPS - Security Auditing
- Blue diving, Bluelog, Bloover II - Bluetooth Security Tools
- WiFi Protector, WiFi Guard, WiFi Inspector - Mobile WiFi Security Tools
- Shodan - Information gathering
- RIOT,beSTORM, IoTSploit, IoTSeeker - Vulnerability Scanning
- Foren6, Z-Wave, CloudShark - Sniffing
- Attify Killerbee Framework - Hacking zigbee devices
- SeaCat.io - Security-first SaaS
- Qualys Cloud Platform - Assessment and Compliance
- Cloud passage Halo - Server Security Platform
- Core Cloud Inspect, Nessus Enterprise, Trend Micro Deep Security, SAINT Cloud - Vulnerability Assessment
- Nessus Professional, GFILanGuard, Nikto, Qualys - Vulnerability Scanning
- OpenVAS - Vulnerability Scanning Framework
- RetinaCS - Vulnerability Management
- SAINT Security Suite - Assessment and Asset Management
- beSECURE Automated Vulnerability Detection System - Automated Vulnerability Assessment
- Open SEZ
- CIRT Password DataBase
- Default Router Passwords
- Forty Pound Head Default Password List
- Default-Password List
- rtgen
- Winrtgen
- Elcomsoft Password Recovery
- PCUnlocker
- Passware kit forensic
- Stellar Pheonix password recovery
- pwdump
- fgdump
- hashcat
- Lopht Crack
- ophcrack
- Rainbow Crack
- Cain and Abel
- OpenStego
- QuickStego
- CryptaPix
- gifshuffle
- SNOW (Whitespace Steganography)
- StegJ
- StegoStick
- OmniHide Pro
- RT Steganography
- StegoStick
- DeepSoud
- BitCrypt
- SilentEye
- StegoStick
- GiliSoft File Lock Pro
- Folder dock 5
- Invisible Secrets 4
- Spam mimic
- Gargyole
- StegAlyzer SS
- Virtual Steganography Laboratory
- Elite Wrap
- Soprano 3
- exec2vbs
- Dark Horse Trojan Virus Maker
- Senna Spy Trojan Generator
- Umbra loader
- BitCrypter
- Betacrypt
- CypherX
- RIG Exploit Kit
- Magnitude
- Terror
- Angler
- Neutrino
- Sundown
- Hashmyfiles
- Hashtab
- Hashcalc
- md5deep
- Jotti
- IOBit
- Metadefender
- FLOSS
- strings
- BINtext
- PEId
- UPX
- exeinfo
- Dependency Walker
- Synk
- RetireJS
- netstat
- TCPView
- CurrPorts
- Process Explorer
- Monit
- regshot
- RegScanner
- Reg Organizer
- JV16 Power Tools
- Windows Service Manager(srvman)
- Process Hacker
- Mirekusoft
- SysAnalyzer
- Revo Uninstaller
- DriverView
- DriverBooster
- DriverReviver
- SIGVERIF
- TripWire
- Netwrix Auditor
- VeriSys
- API metrics
- APIMonitor
- Runscope
- AlertSite
- DNSQuerySniffer
- DNSStuff
- SONAR
- MoSucker
- ProRAT
- njRAT
- Netwire
- DarkComet
- Houdini
- PCRat/Ghost
- Poison IVY
- Kovter
- Nitol
- Qadars
- Wingbird
- Finfisher
- Grayfish
- Whistler
- ZeroAccess
- SonicBat
- TeraBit
- DELmE
- Batch Worm Generator
- C++ Worm Generator
- sublist3r
- netcraft
- shodan
- censys
- Burpsuite
- Zaproxy
- Paros Proxy
- Firebug
- Spiderfoot
- Wildshark Seo spider tool
- Webdata extractor