Try searching for "database", "file", "API", or browse by category
12 Tools in MCP Servers
GhidraMCP
by LaurieWired
MCP Server for Ghidra
jadx-mcp-plugin
by mobilehackinglab
This project provides a Jadx plugin written in Java, which exposes the Jadx API over HTTP — enabling live interaction through MCP clients like Claude via the Model Context Protocol (MCP).
mcp-maigret
by BurtTheCoder
MCP server for maigret, a powerful OSINT tool that collects user account information from various public sources.
mcp-dnstwist
by BurtTheCoder
MCP server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.
mcp-shodan
by BurtTheCoder
MCP server for querying the Shodan API
roadrecon_mcp_server
by atomicchonk
Claude MCP server to perform analysis on ROADrecon data
mcp-virustotal
by BurtTheCoder
A Model Context Protocol (MCP) server for querying the VirusTotal API.
binaryninja-mcp
by MCPPhalanx
Another™ MCP Server for Binary Ninja with superpower 🥵
BloodHound-MCP-AI
by MorDavid
BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language instead of complex Cypher queries.
mcp-server
by PortSwigger
MCP Server for Burp
nuclei-mcp
by addcontent
An MCP server implementation
illumio-mcp-server
by alexgoller
The first MCP server for cybersecurity
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.