Try searching for "database", "file", "API", or browse by category
25 Tools in Red Team
CarbonCopy
by paranoidninja
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
AdvPhishing
by Ignitetch
This is Advance Phishing Tool ! OTP PHISHING
msldap
by skelsec
LDAP library for auditing MS AD
Empire
by BC-SECURITY
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
merlin
by Ne0nd0g
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
PoshC2
by nettitude
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
PEASS-ng
by peass-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
RedCloud-OS
by RedTeamOperations
RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)
Lodestar-Forge
by c0nf1den71al
Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.
atomic-red-team
by redcanaryco
Small and highly portable detection tests based on MITRE's ATT&CK.
evilginx2
by kgretzky
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
shad0w
by bats3c
A post exploitation framework designed to operate covertly on heavily monitored environments
smbcrawler
by SySS-Research
smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares
Havoc
by HavocFramework
The Havoc Framework
sliver
by BishopFox
Adversary Emulation Framework
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.