Try searching for "database", "file", "API", or browse by category
335 Tools in InfoSec Tools
Vuldroid
by jaiswalakshansh
Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code
hpAndro1337
by RavikumarRamesh
Repository for download all version of @hpAndro1337 (Android AppSec) application.
ovaa
by oversecured
Oversecured Vulnerable Android App
diva-android
by payatu
DIVA Android - Damn Insecure and vulnerable App for Android
AndroGoat
by satishpatnayak
AndroGoat
Vulnerable-Kext
by ant4g0nist
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Android-InsecureBankv2
by dineshshetty
Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities
allsafe
by t0thkr1s
Intentionally vulnerable Android application.
sadcloud
by nccgroup
A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure
iam-vulnerable
by BishopFox
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.
AzureGoat
by ine-labs
AzureGoat : A Damn Vulnerable Azure Infrastructure
AWSGoat
by ine-labs
AWSGoat : A Damn Vulnerable AWS Infrastructure
wrongsecrets
by OWASP
Vulnerable app with examples showing how to not use secrets
cdkgoat
by bridgecrewio
CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
PetitPotam
by topotam
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.