Try searching for "database", "file", "API", or browse by category
335 Tools in InfoSec Tools
UEFITool
by LongSoft
UEFI firmware image viewer and editor
ghidra
by NationalSecurityAgency
Ghidra is a software reverse engineering (SRE) framework
toutatis
by megadose
Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more
recon-ng
by lanmaster53
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
datasploit
by DataSploit
An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
image-match
by rhsimplex
🎇 Quickly search over billions of images
ghauri
by r0oth3x49
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
NetExec
by Pennyw0rth
The Network Execution Tool
WinPwn
by S3cur3Th1sSh1t
Automation for internal Windows Penetrationtest / AD-Security
uro
by s0md3v
declutters url lists for crawling/pentesting
dnsgen
by AlephNullSK
DNSGen is a powerful and flexible DNS name permutation tool designed for security researchers and penetration testers. It generates intelligent domain name variations to assist in subdomain discovery and security assessments.
lazyrecon
by nahamsec
This script is intended to automate your reconnaissance process in an organized fashion
Gxss
by KathanP19
A tool to check a bunch of URLs that contain reflecting params.
Jeeves
by ferreiraklet
Jeeves SQLI Finder
bluepill
by season-lab
BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.