Try searching for "database", "file", "API", or browse by category
335 Tools in InfoSec Tools
cve-2025-0133
by dodiorne
This script performs safe, authorized testing for the vulnerability CVE-2025-0133, a reflected Cross-Site Scripting (XSS) issue in the GlobalProtect portal and gateway login pages of Palo Alto Networks' PAN-OS software.
objection
by sensepost
📱 objection - runtime mobile exploration
IOSSecuritySuite
by securing
iOS platform security & anti-tampering Swift library
frida
by frida
Clone this repo to build Frida
PufferRelay
by MPolymath
Pentesting tool to extract valuable information from .pcap (wireshark) files
ADMR
by Imp0sters
Active Directory Mindmap Recipes: A Compromise à la Carte
jxscout
by francisconeves97
jxscout superpowers JavaScript analysis for security researchers
BugBountyBooks
by akr3ch
A collection of PDF/books about the modern web application security and bug bounty.
aem-hacker
by 0ang3el
An MCP server implementation
SubEnum
by bing0o
bash script for Subdomain Enumeration
VulnerableLightApp
by Aif4thah
Vulnerable API for research and education
dvta
by srini0x00
Damn Vulnerable Thick Client App developed in C# .NET
vulnerable-nginx
by detectify
An intentionally vulnerable NGINX setup
log-snare
by sea-erkin
LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.
skf-labs
by blabla1337
Repo for all the SKF Docker lab examples
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.