Skip to main content

CyberTrace Tools Directory

Explore a comprehensive collection of free cybersecurity tools used by penetration testers, SOC analysts, DFIR investigators, threat hunters, and security engineers. Each category contains curated tools with descriptions, links, and practical use cases.

OSINT Tools

Open-source intelligence tools for recon, investigation, and data gathering.

ReconInvestigationIntel

Threat Intelligence

Feeds, databases, and platforms for tracking malicious activity.

IndicatorsFeedsMalicious IPs

Malware Analysis

Static and dynamic analysis tools for malware investigation.

SandboxReverse Engineering

DFIR / Forensics

Tools for digital forensics, memory analysis, and incident response.

ForensicsMemoryIR

Network Analysis

Traffic inspection, packet capture, and network diagnostics tools.

PacketsTrafficDiagnostics

Cloud Security

Tools for securing cloud workloads, IAM, and configurations.

CloudIAMAudit

Red Team Tools

Offensive security tools for exploitation, C2, and post-exploitation.

OffensiveC2Exploitation

Blue Team Tools

Defensive tools for monitoring, detection, and response.

DefenseDetection

Reverse Engineering

Tools for binary analysis, disassembly, and debugging.

DisassemblyDebugging

Wireless & Radio

WiFi, SDR, Bluetooth, and RF analysis tools.

WiFiSDRRF

ICS / SCADA

Industrial control system security tools.

IndustrialCritical Infrastructure

Crypto & Stego

Cryptography and steganography analysis tools.

CryptoStego

Web App Security

Tools for testing and securing web applications.

WebPentest

DevSecOps

Tools for secure CI/CD, SAST, DAST, and dependency scanning.

CI/CDAutomation

Identity & Access

IAM, SSO, and authentication security tools.

IAMAuth

Email Security

Tools for phishing detection, email header analysis, and SPF/DMARC.

EmailPhishing

Mobile Security

Android and iOS analysis and pentesting tools.

AndroidiOS

Container Security

Tools for securing Docker, Kubernetes, and cloud-native workloads.

K8sDocker

SIEM & Log Analysis

Tools for log parsing, SIEM analysis, and event correlation.

LogsSIEM

Vulnerability Scanners

Tools for scanning systems, networks, and applications for vulnerabilities.

ScanningVulnerabilities

Packet Tools

Packet crafting, replay, and manipulation tools.

PacketsCrafting

Memory Analysis

Tools for RAM forensics and memory dump analysis.

MemoryForensics

Browser-Based Tools

Cybersecurity tools that run entirely in the browser.

BrowserOnline