1. Nmap
2. Metasploit
3. Wireshark
4. Kali Linux
5. John the Ripper
6. Nikto
7. Burp Suite
8. Tor
9. Tcpdump
10. Aircrack-ng
11. Splunk
12. Acunetix
13. Snort
14. Mimecast
15. Malwarebytes
16. OpenVAS
17. SecPod SanerNow
18. UnderDefense
19. Intruder
20. ManageEngine Vulnerability Manager Plus
21. ManageEngine Log360
22. SolarWinds Security Event Manager
23. Norton Security
24.McAfee
25. AVG
26. System Mechanic Ultimate Defense
27. Vipre
28. LifeLock
29. Bitdefender Total Security
30. NordLayer
31. Perimeter 81
32. CIS
33. Webroot
34. GnuPG
35. Sparta Antivirus
Advanced Malware Protection (AMP)
Cloud Security
Email Security
Endpoint Security
Firewalls
Network Security
Network Visibility and Segmentation
Next-Generation Intrusion Prevention System (NGIPS)
Security Management
Security Platform
VPN and Endpoint Security Clients
Vulnerability Management
Web Security
Workload Security
Asset Management Suite
Client Management Suite
Cloud Secure Web Gateway
Cloud Workload Protection
Control Compliance Suite
Data Center Security
Data Loss Prevention
Deep File Inspection
Edge Secure Web Gateway
Email Security.cloud
Email Threat Detection and Response
Encryption
Endpoint Detection and Response
GHOST® Solution Suite
Global Consulting Services
IGA
Integrated Cyber Defense Exchange (ICDx)
Intelligence Services
Mail Security for Microsoft Exchange
Management Center and Reporting
Messaging Gateway
Messaging Gateway
Mobile Device Security Service
PAM
PAM
Phishing Readiness
Public Sector Professional Services
Sandboxing
Security Analytics
Server Management Suite
ServiceDesk
SiteMinder
SSL Visibility Appliance
Symantec Endpoint Security Complete
Symantec Endpoint Security Enterprise
Symantec Storage Protection
VIP
Virtual Secure Web Gateway
Web Application Firewall and Reverse Proxy
Web Isolation
Web Protection
Zero Trust Network Access
1. iSpy
2. iRET
3. iWep pro
4. Frida
5. Firecat
6. Burp
7. Myriam iOS 8. Cycript
9. Happer App
10. Paraden D.S.
Android:
1. Dsploit
2. DriodSqli
3. WPS Tester
4. Nmap
5. AndroRAT
6. Zanti
7. Netcut
8. Fing
9. Termux
10. Network Spoofer