Gracias a
kagure he encontrado un repositorio bastante ordenado con herramientas de seguridad, algunos grandes conocidas, otras no tanto, pero todas muy útiles.
(http://images3.cableorganizer.com/blackbox/voice-data-kit/Voice-Data-Tool-Kit_sm.jpg)
Les dejo los enlaces a cada categoría para que descubras nuevas herramientas, aprendas de ellas y las utilices.
- Bluetooth Tools/ (http://pentester.fr/resources/tools/pentest/Bluetooth%20Tools/)
- Browser Extensions/ (http://pentester.fr/resources/tools/pentest/Browser%20Extensions/)
- Exploitation Tools/ (http://pentester.fr/resources/tools/pentest/Exploitation%20Tools/)
- Information Gathering/ (http://pentester.fr/resources/tools/pentest/Information%20Gathering/)
- Libraries/ (http://pentester.fr/resources/tools/pentest/Libraries/)
- Network Discovery tools/ (http://pentester.fr/resources/tools/pentest/Network%20Discovery%20tools/)
- Network Login Auditors/ (http://pentester.fr/resources/tools/pentest/Network%20Login%20Auditors/)
- Network Security Scanners/ (http://pentester.fr/resources/tools/pentest/Network%20Security%20Scanners/)
- Networking Utilities/ (http://pentester.fr/resources/tools/pentest/Networking%20Utilities/)
- OS Detection Tools/ (http://pentester.fr/resources/tools/pentest/OS%20Detection%20Tools/)
- Packet Crafting Tools/ (http://pentester.fr/resources/tools/pentest/Packet%20Crafting%20Tools/)
- Packet Sniffers/ (http://pentester.fr/resources/tools/pentest/Packet%20Sniffers/)
- Password Auditing/ (http://pentester.fr/resources/tools/pentest/Password%20Auditing/)
- Password Cracking/ (http://pentester.fr/resources/tools/pentest/Password%20Cracking/)
- Port Scanners/ (http://pentester.fr/resources/tools/pentest/Port%20Scanners/)
- Reverse Engineering/ (http://pentester.fr/resources/tools/pentest/Reverse%20Engineering/)
- SQL Injection/ (http://pentester.fr/resources/tools/pentest/SQL%20Injection/)
- SSL Checkers/ (http://pentester.fr/resources/tools/pentest/SSL%20Checkers/)
- SSL Proxies/ (http://pentester.fr/resources/tools/pentest/SSL%20Proxies/)
- Service Fingerprinting/ (http://pentester.fr/resources/tools/pentest/Service%20Fingerprinting/)
- Thick Client Tools/ (http://pentester.fr/resources/tools/pentest/Thick%20Client%20Tools/)
- VoIP Security Tools/ (http://pentester.fr/resources/tools/pentest/VoIP%20Security%20Tools/)
- Web Applicative Proxies/ (http://pentester.fr/resources/tools/pentest/Web%20Applicative%20Proxies/)
- Web Applicative Scanners/ (http://pentester.fr/resources/tools/pentest/Web%20Applicative%20Scanners/)
- Web Services Security Tools/ (http://pentester.fr/resources/tools/pentest/Web%20Services%20Security%20Tools/)
- Web Vulnerability Scanners/ (http://pentester.fr/resources/tools/pentest/Web%20Vulnerability%20Scanners/)
- Wi-Fi/ (http://pentester.fr/resources/tools/pentest/Wi-Fi/)
Fuente (http://www.dragonjar.org/repositorio-con-herramientas-de-seguridad.xhtml)