EN
ENNA
|ENNA

Welcome to ENNA: Why We Built an Open-Source Security Tool Index

announcementlaunchosintrecon

Today we're launching ENNA, a curated index of open-source OSINT and reconnaissance tools built for security professionals, researchers, and anyone who works at the intersection of offensive security, blockchain forensics, and digital investigation.

The Problem

If you've spent any time in security, you know the tooling landscape is enormous and fragmented. There are thousands of open-source tools scattered across GitHub, some actively maintained, some abandoned years ago. Finding the right tool for a specific job means searching through outdated blog posts, scrolling Reddit threads, or asking around in Discord servers. GitHub's own search is noisy. Awesome-lists help but give you a flat list of names with one-line descriptions and no way to filter, compare, or assess whether a tool is still alive.

We wanted something better. Not another awesome-list, but a proper index with real data.

What ENNA Does

ENNA launched today with 213 tools across 14 categories:

  • -Network Recon - Port scanners, host discovery, network mapping (Nmap, Masscan, RustScan, Shodan CLI)
  • -Subdomain Enumeration - DNS discovery and asset mapping (Subfinder, Amass, Findomain)
  • -Web Scanning - Directory bruting, tech fingerprinting, vulnerability detection (Nuclei, Feroxbuster, ffuf, sqlmap)
  • -OSINT Social - Username lookup, profile analysis, social network mapping (Sherlock, Maigret)
  • -OSINT General - Email, phone, people search, metadata extraction (theHarvester, SpiderFoot, Holehe)
  • -Vulnerability Scanning - CVE scanning, misconfiguration detection (Nuclei, OpenVAS, Trivy)
  • -Wireless - WiFi auditing, Bluetooth, RF analysis (Aircrack-ng, Bettercap, Kismet)
  • -Digital Forensics - Disk forensics, memory analysis, file carving (Volatility, Autopsy, Velociraptor)
  • -Crypto Tracing - Blockchain analysis, wallet tracing, transaction mapping (Bitcoin Core CLI, Geth, Cast)
  • -Password Attacks - Hash cracking, brute force, credential tools (Hashcat, John the Ripper, Hydra)
  • -Exploitation - Exploit frameworks, payload generation, post-exploitation (Metasploit, Sliver, Mythic)
  • -Phishing Analysis - Phishing kits, URL analysis, email header analysis (GoPhish, Evilginx2)
  • -Dual Use - Legitimate tools with offensive applications (Wireshark, Burp Suite, Ghidra, YARA)
  • -Offensive Ops - Red team tooling, C2 frameworks, lateral movement (CrackMapExec, BloodHound, Impacket)

Every tool has a detailed description, installation commands for multiple platforms, use cases, alternative tools, and live GitHub statistics including star count, fork count, last commit date, and open issues.

Tool Comparisons

One of ENNA's most useful features is automatic comparison pages. When two tools are listed as alternatives to each other, you get a dedicated comparison page showing them side by side. Want to decide between Nmap and Masscan? Or Subfinder vs Amass? Each comparison page breaks down the differences so you can make an informed choice. There are already over 85 comparison pages generated across the tool index.

The Library

Beyond tools, ENNA includes a curated library of books covering penetration testing, OSINT, social engineering, blockchain, malware analysis, privacy, and more. Each book has a detailed description and links to multiple purchase formats (paperback, hardcover, Kindle). Whether you're just getting started in security or looking for deep-dive references on specific topics, the library has you covered.

Recommended Hardware

We also maintain a curated list of hardware and devices for hands-on security work. From the HackRF One and Flipper Zero to WiFi adapters with monitor mode support and laptops suited for running VMs and security tooling, the gear section covers the physical tools that complement the software.

What Makes ENNA Different

There are other tool lists out there. Here's what sets ENNA apart:

  • -Live GitHub stats - Every open-source tool shows real star counts, fork counts, open issues, and last commit date. You can immediately tell whether a tool is actively maintained or abandoned.
  • -Detailed descriptions - Not just a name and a one-liner. Every tool has a full description explaining what it does, how it works, and when to use it.
  • -Installation commands - Platform-specific install instructions so you can get running quickly on Linux, macOS, or Windows.
  • -Use cases - Concrete examples of when and why you'd use each tool.
  • -Cross-linked alternatives - Every tool links to its alternatives, so you can easily explore options and find the right fit for your workflow.
  • -Category organization - Tools are grouped into logical categories that match how security professionals actually think about their work.

What's Next

This is just the launch. We have plans to expand the tool database significantly, add more categories, improve search and filtering, and build out the comparison features. We'll be publishing weekly updates every Monday covering new additions and changes.

If you have tool suggestions, corrections, or feedback, we'd love to hear from you. You can also subscribe to the newsletter to get weekly updates delivered to your inbox.

Welcome to ENNA.

Weekly Newsletter

New tools, updates, and changes delivered every Monday morning.

Subscribe on Substack