This section covers the list of some industry recommended tools, commercial softwares and open source tools categorized under network security, monitoring, penetration testing, email security and application security to name a few. These are some of the tools I’ve personally tried and tested while some of them have been recommended by industry professionals and academic journals.
“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.“
Edward Snowden
Categories
Cryptography

“We become what we behold. We shape our tools, and thereafter our tools shape us.“
Marshall McLuhan
“The intentions of a tool are what it does. A hammer intends to strike, a vise intends to hold fast, a lever intends to lift. They are what it is made for. But sometimes a tool may have other uses that you don’t know. Sometimes in doing what you intend, you also do what the knife intends, without knowing.”
Philip Pullman
“Today, you have the opportunity to transcend from a disempowered mindset of existence to an empowered reality of purpose-driven living. Today is a new day that has been handed to you for shaping. You have the tools, now get out there and create a masterpiece.”
Steve Marboli