Try searching for "database", "file", "API", or browse by category
25 Tools in Active Directory
WinPwn
by S3cur3Th1sSh1t
Automation for internal Windows Penetrationtest / AD-Security
SharpRDP
by 0xthirteen
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
DomainPasswordSpray
by dafthack
DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will automatically generate the userlist from the domain. BE VERY CAREFUL NOT TO LOCKOUT ACCOUNTS!
Responder-for-Mac
by RajChowdhury240
This repo contains Mac M1/M2/M3/M4 Responder Prebuilt binary
BloodHound-Legacy
by SpecterOps
Six Degrees of Domain Admin
impacket
by fortra
Impacket is a collection of Python classes for working with network protocols.
PowerUpSQL
by NetSPI
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
PowerSploit
by PowerShellMafia
PowerSploit - A PowerShell Post-Exploitation Framework
Powermad
by Kevin-Robertson
PowerShell MachineAccountQuota and DNS exploit tools
Adalanche
by lkarlslund
Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.