Terminal GuideTerminal Guide

Linux Security Tools

Comprehensive reference of 96 offensive security tools for Linux, organized into 12 categories. From network reconnaissance to exploitation and reporting, these tools form the foundation of modern penetration testing.

Ethical Use Only

These tools are intended for authorized security testing, CTF competitions, and educational purposes only. Always obtain proper written authorization before testing systems you do not own. Unauthorized access to computer systems is illegal in most jurisdictions.

Categories Overview

CategoryTools
Reconnaissance11
Password & Brute Force11
Vulnerability Scanning5
Network Attacks8
Exploitation17
Post-Exploitation9
Wireless Attacks7
Web App Testing5
Mobile Security10
Reverse Engineering3
Social Engineering4
Reporting6

Reconnaissance

11 tools

Information gathering and network discovery tools for mapping attack surfaces and identifying targets.

Password & Brute Force

11 tools

Password cracking, brute force attack, and credential testing tools for security assessments.

Vulnerability Scanning

5 tools

Automated vulnerability detection and assessment tools for identifying security weaknesses.

Network Attacks

8 tools

Network traffic analysis, interception, and attack tools for testing network security.

Exploitation

17 tools

Exploit development, delivery, and execution tools for penetration testing engagements.

Post-Exploitation

9 tools

Tools for maintaining access, privilege escalation, and lateral movement after initial compromise.

Wireless Attacks

7 tools

Tools for auditing wireless network security including Wi-Fi, Bluetooth, and RF protocols.

Web App Testing

5 tools

Web application penetration testing tools for finding and exploiting web vulnerabilities.

Mobile Security

10 tools

Mobile application security testing tools for Android and iOS platforms.

Reverse Engineering

3 tools

Binary analysis, disassembly, and reverse engineering tools for malware analysis and exploit research.

Social Engineering

4 tools

Social engineering and phishing simulation tools for testing human-factor security.

Reporting

6 tools

Vulnerability management, documentation, and reporting tools for professional security assessments.

This reference is based on the "Offensive Linux Security Tools" compilation. Tools are listed for educational and authorized testing purposes.

Last updated: February 2026