Try searching for "database", "file", "API", or browse by category
25 Tools in Red Team
DojoLoader
by naksyn
Generic PE loader for fast prototyping evasion techniques
Nimbo-C2
by itaymigdal
Nimbo-C2 is yet another (simple and lightweight) C2 framework
Sandman
by Idov31
Sandman is a NTP based backdoor for red team engagements in hardened networks.
dnstwist
by hazcod
A tool to monitor for potential spear phishing domains and send to Slack.
shell_bringer
by onurcangnc
ShellBringer is a Python script designed for penetration testers. It facilitates the creation and management of reverse shell payloads, automating listener setup across multiple platforms.
evil-winrm-py
by adityatelange
Execute commands interactively on remote Windows machines using the WinRM protocol
ImpulsiveDLLHijack
by knight0x07
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
linux-smart-enumeration
by diego-treitos
Linux enumeration tool for pentesting and CTFs with verbosity levels
Crassus
by vu-ls
An MCP server implementation
ligolo-ng
by nicocha30
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.