Top 3 Easy to Use Cybersecurity Tools You Can Run in Your Terminal



This content originally appeared on DEV Community and was authored by Rijul Rajesh

You don’t need expensive hardware or enterprise dashboards to start learning cybersecurity. With just your terminal and a few free tools, you can scan, test, and analyze systems in the same way professionals do.

The best part is there are practice websites made for this exact purpose so you can learn without worrying about legality.

Let’s go step by step with three beginner friendly tools: Nmap, Nikto, and Tcpdump.

1. Nmap

Nmap (Network Mapper) scans machines for open ports and services.

Installation

On Linux (Debian/Ubuntu):

sudo apt update
sudo apt install nmap

On macOS (with Homebrew):

brew install nmap

Example: Scan a test website

Use the official Nmap test server:

nmap scanme.nmap.org

Sample output (shortened):

Starting Nmap 7.80 ( https://nmap.org ) at 2025-09-08 00:00 IST
Nmap scan report for scanme.nmap.org (45.33.32.156)
PORT     STATE    SERVICE
22/tcp   open     ssh
80/tcp   open     http
9929/tcp open     nping-echo

You can also check service versions:

nmap -sV scanme.nmap.org

2. Nikto

Nikto is a web vulnerability scanner. It automatically checks for outdated software and common misconfigurations.

Installation

On Linux (Debian/Ubuntu):

sudo apt update
sudo apt install nikto

On macOS:

brew install nikto

Example: Scan a vulnerable web app

Try it against Acunetix’s test site:

nikto -h http://testphp.vulnweb.com

Sample output (shortened):

- Nikto v2.5.0
- Target IP:  195.35.123.188
- Target Hostname: testphp.vulnweb.com
+ Server: Apache/2.2.8
+ The X-XSS-Protection header is not defined
+ The X-Frame-Options header is not present
+ Entry found: /admin/

This tells you the server is missing security headers and even exposes an /admin page.

3. Tcpdump

Tcpdump captures network traffic and shows it live in your terminal.

Installation

On Linux (Debian/Ubuntu):

sudo apt update
sudo apt install tcpdump

On macOS:

brew install tcpdump

Example: Monitor traffic while visiting a test site

Run:

sudo tcpdump -i eth0 host testphp.vulnweb.com

Now open http://testphp.vulnweb.com in your browser. Tcpdump will log the packets:

Sample output (shortened):

12:00:05 IP your-ip.50544 > testphp.vulnweb.com.http: Flags [S], seq 12345, win 65535
12:00:05 IP testphp.vulnweb.com.http > your-ip.50544: Flags [S.], ack 12346
12:00:05 IP your-ip.50544 > testphp.vulnweb.com.http: Flags [.], ack 67890

This shows the TCP handshake and HTTP request flow.

Final Thoughts

By combining Nmap, Nikto, and Tcpdump you get a starter toolkit for cybersecurity exploration:

  • Nmap maps out open ports and services.
  • Nikto checks for common web vulnerabilities.
  • Tcpdump lets you watch raw traffic in real time.

All of these run directly in your terminal, are free, and can be practiced safely on scanme.nmap.org and testphp.vulnweb.com.

Try them out today and you’ll see that cybersecurity is much more approachable than it first appears.

If you’re a software developer who enjoys exploring different technologies and techniques like this one, check out LiveReview.

LiveReview delivers high-quality feedback on your PRs/MRs within minutes.
It saves hours per review by providing fast, automated first-pass insights. This helps both junior and senior engineers move faster.

If you’re tired of waiting on peer reviews or unsure about the quality of feedback you’ll receive, LiveReview is here to help.


This content originally appeared on DEV Community and was authored by Rijul Rajesh