Skip to content
Cyber Security World | Hacking Courses | Secure yourself online
Home
Cyber Security Tools
Technology
Fun & Science Ideas
Cyber Security TAFE Australia – Certificate IV
Videos
Blog
YouTube Channel
St. Monica for IT Services — Managed IT & Cybersecurity in Melbourne
Home
Cyber Security Tools
Technology
Fun & Science Ideas
Cyber Security TAFE Australia – Certificate IV
Videos
Blog
YouTube Channel
St. Monica for IT Services — Managed IT & Cybersecurity in Melbourne
Cyber Security World | Hacking Courses | Secure yourself online
Main Menu
Search for:
Search
Search
Blog
Cyber Security – Certificate IV
Menu Toggle
BSBINS401 Analyse and present research information
BSBWHS309 Contribute effectively to WHS communication and consultation processes
ICTCLD401 Configure cloud services
ICTPRG435 Write scripts for software applications
VU23213 Utilise basic network concepts and protocols required in cyber security
VU23215 – Test concepts and procedures for cyber security
VU23217 Recognise the need for cyber security in an organisation
VU23218 Implement network security infrastructure for an organisation
VU23219 Manage the security infrastructure for an organisation
VU23221 Evaluate and test an incident response plan for an enterprise
VU23223 Apply cyber security legislation, privacy and ethical practises
VU23225 Investigate Windows security features
Detailed Report on “VU23225 Investigate Windows Security Features – Lesson 01
Detailed Report on “VU23225 Investigate Windows Security Features – Lesson 02
Detailed Report on “VU23225 Investigate Windows Security Features – Lesson 03
Detailed Report on VU23225 Investigate Windows Security Features – Lesson 04
Detailed Report on VU23225 Investigate Windows Security Features – Lesson 05
Detailed Report on VU23225 Investigate Windows Security Features – Lesson 06
Detailed Report on VU23225 Investigate Windows Security Features – Lesson 07
Fun
Menu Toggle
3I/ATLAS — The Mysterious Interstellar Visitor Approaching Earth
How to Install a Smart Lock on Your Door
Wireless Power: Tesla’s Vision of the Future
Home
St. Monica for IT Services — Managed IT & Cybersecurity in Melbourne
Technology
Menu Toggle
5 Wi-Fi Myths That Waste Your Time
DJI Mobile 7P
Do Not Buy These Products
Do NOT Buy: Microsoft Audio Dock
External LED Lights For Content Creators
Gennaris Restoring Vision with AI!
Hollyland Lark M2S
Hollyland Lark M2S Phone App
Unbox Hollyland Lark M2s Ultimate Kit
How to hack a WIFI network and how to secure your WIFI
Latest Feature of Samsung S25 Ultra
Latest Feature of Samsung S25 Ultra 8 3 2025
Latest Features iPhone 16 Pro
Live Translate Phone Calls Samsung Phones
NEW Series Exploring Car Tech Like Never Before
Volkswagen VW Arteon
What is Quantum Computing Explained Simply for Beginners
Wireless USB 2 0 Speakerphone – HuddleCam – HP AIR BA BK
Tools
Menu Toggle
1. Information Gathering Tools
1. Nmap
10. Netdiscover
2. Zenmap
3. theHarvester
4. Maltego
5. Shodan
6. dnsenum
7. dnsrecon
8. Dmitry
9. Whois
10. Forensics Tools
1. Autopsy
2. Binwalk
3. Foremost
4. Sleuth Kit
5. Volatility
11. Reverse Engineering Tools
1. Ghidra
2. IDA Pro
3. Radare2
4. OllyDbg
5. APKTool
12. Stress Testing Tools
1. Slowloris
2. LOIC (Low Orbit Ion Cannon)
3. HOIC (High Orbit Ion Cannon)
13. Hardware Hacking Tools
1. Arduino
2. RFIDIOt
3. USB Rubber Ducky
14. Reporting Tools
1. Dradis
2. Faraday
3. KeepNote
15. Remote Access Tools
1. SSH (OpenSSH)
2. VNC
3. Remmina
16. Vulnerability Exploitation Tools
1. Exploit Database
2. SearchSploit
17. OSINT Tools
1. SpiderFoot
2. Recon-ng
3. Metagoofil
18. Privilege Escalation Tools
1. LinPEAS
2. WinPEAS
3. Linux Exploit Suggester
19. Mobile Pentesting Tools
1. Drozer
2. APKTool
3. MobSF (Mobile Security Framework)
2. Vulnerability Analysis Tools
1. Nessus
2. OpenVAS
3. Nikto
4. Wapiti
5. Golismero
20. Cloud Pentesting Tools
1. Pacu
2. ScoutSuite
3. CloudSploit
21. Red Team Tools
1. BloodHound
2. CrackMapExec
3. Responder
22. Exploit Development Tools
1. GDB (GNU Debugger)
2. pwntools
3. ROPgadget
4. NASM
23. Password Attack Tools
1. CeWL
2. John the Ripper
3. Hashcat
4. THC Hydra
24. Container and Kubernetes Security Tools
1. kube-hunter
2. Trivy
25. Metasploit Framework Tools
1. msfconsole
2. msfvenom
3. Exploit Modules
4. Payload Modules
5. Auxiliary Modules
6. Post Modules
7. Meterpreter
8. Armitage
3. Web Application Analysis Tools
1. Burp Suite
2. OWASP ZAP
3. W3af
4. SQLmap
5. Commix
6. Dirb
7. Ffuf
4. Password Attacks Tools
1. John the Ripper
2. Hashcat
3. Hydra
4. CeWL
5. Medusa
6. Patator
5. Wireless Attacks Tools
1. Aircrack-ng
2. Fern Wifi Cracker
3. Reaver
4. Kismet
5. Wifite
6. Exploitation Tools
1. Metasploit Framework
2. BeEF (Browser Exploitation Framework)
3. Armitage
7. Social Engineering Tools
1. Social-Engineer Toolkit (SET)
2. BeEF (Browser Exploitation Framework)
3. PhishingFrenzy
4. King Phisher
8. Sniffing and Spoofing Tools
1. Wireshark
2. Ettercap
3. Bettercap
4. Responder
5. dsniff
6. ARP-Spoof
9. Post-Exploitation Tools
1. Metasploit Meterpreter
2. Empire
3. Cobalt Strike
4. WinPEAS / LinPEAS
5. PowerSploit
Azure Services
Connect to Azure Ubuntu Linux VM from Windows 11 — MobaXterm (SSH)
Create VM in Azure Cloud Services — Ubuntu Server 24.04 LTS (Free Student Account)
Install a Lightweight GUI on Ubuntu VM (XFCE) & Enable RDP (xrdp) on Azure
Build Your Own Private VPN
Hack into a Windows 10
How to Bypass Microsoft Account Sign-In on Windows 11 Setup (Use Local Account Instead)
How to Hack in a Win11 Machine
How to Hack Windows 11 Using osk.exe (On-Screen Keyboard Exploit)
How to Install Windows 11 ISO on VMware Workstation (Step-by-Step Guide)
How to secure you computer against hackers and unauthorized access
How to Use BitLocker to Encrypt Your Windows Hard Drive and Protect Your PC from Hackers
How to Use Rufus to Create a Bootable USB for Windows 10
Plex Issues Urgent Password Reset After New Data Breach
Preparing Your Kali Linux Environment for Penetration Testing
Trace back a Hacker
Trace back a hacker – Part 1 of 2 – Gather Information
Trace back a hacker – Part 2 of 2 – Analysis
فيروس FleshStealer كيف تحمي نفسك
Home
»
Tools
»
11. Reverse Engineering Tools
11. Reverse Engineering Tools
Reverse Engineering Tools
: These tools are used to analyze software, identify vulnerabilities, or understand how a program works. They are often used to analyze malware or create patches for software.
1. Ghidra
2. IDA Pro
3. Radare2
4. OllyDbg
5. APKTool
Scroll to Top