Less Googling, More Hacking!

330 InfoSec Tools in Our Directory

45 Tools in Vulnerable Labs

IWA-Java

IWA-Java

by fortify

Insecure Web + API application with example Fortify integrations into many DevSecOps and CICD platforms

fortify-integration-sample vulnerable-sample-app
2
View Details
IWA-DotNet

IWA-DotNet

by fortify

Insecure Web Application - .NET version

devsecops fortify-integration-sample vulnerable-sample-app
5
View Details
damn-vulnerable-MCP-server

damn-vulnerable-MCP-server

by harishsg993010

Damn Vulnerable MCP Server

security tool
1006
View Details
FridaMe

FridaMe

by CognisysGroup

FridaMe is intentionally vulnerable android application developed to demonstrate the usage of Frida.

security tool
8
View Details
Damn-vulnerable-sca

Damn-vulnerable-sca

by harekrishnarai

Damn Vulnerable SCA Application

application-security product-security sast
36
View Details
Featured
juice-shop

juice-shop

by juice-shop

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

24pullrequests application-security appsec
11282
View Details
Featured
vulhub

vulhub

by vulhub

Pre-Built Vulnerable Environments Based on Docker-Compose

docker docker-compose dockerfile
18922
View Details
Featured
DVWA

DVWA

by digininja

Damn Vulnerable Web Application (DVWA)

dvwa hacking infosec
11260
View Details
Verified
WebGoat

WebGoat

by WebGoat

WebGoat is a deliberately insecure application

security tool
7509
View Details
Verified
kubernetes-goat

kubernetes-goat

by madhuakula

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

blueteam cloud-native cloud-security
4777
View Details
Verified
cloudgoat

cloudgoat

by RhinoSecurityLabs

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool

security tool
3228
View Details
VulnerableLightApp

VulnerableLightApp

by Aif4thah

Vulnerable API for research and education

api cybersecurity-education cybersecurity-training
44
View Details
dvta

dvta

by srini0x00

Damn Vulnerable Thick Client App developed in C# .NET

security tool
154
View Details
vulnerable-nginx

vulnerable-nginx

by detectify

An intentionally vulnerable NGINX setup

security tool
238
View Details
log-snare

log-snare

by sea-erkin

LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.

security tool
31
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.