Less Googling, More Hacking!

331 InfoSec Tools in Our Directory

331 Tools in InfoSec Tools

illumio-mcp-server

illumio-mcp-server

by alexgoller

The first MCP server for cybersecurity

security tool
1
View Details
CyberBattleSim

CyberBattleSim

by microsoft

An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.

security tool
1709
View Details
taranis-ai

taranis-ai

by taranis-ai

Taranis AI is an advanced Open-Source Intelligence (OSINT) tool, leveraging Artificial Intelligence to revolutionize information gathering and situational analysis.

artificial-intelligence cybersecurity nlp
657
View Details
Burp-AnonymousCloud

Burp-AnonymousCloud

by codewatchorg

Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities

security tool
46
View Details
CarbonCopy

CarbonCopy

by paranoidninja

A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux

security tool
1370
View Details
Verified
archerysec

archerysec

by archerysec

ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.

asoc aspm devops
2380
View Details
Verified
altdns

altdns

by infosec-au

Generates permutations, alterations and mutations of subdomains and then resolves them

security tool
2417
View Details
Verified
AdvPhishing

AdvPhishing

by Ignitetch

This is Advance Phishing Tool ! OTP PHISHING

advancephishing amazone-tfo facebook-otp
2929
View Details
Verified
Advanced-SQL-Injection-Cheatsheet

Advanced-SQL-Injection-Cheatsheet

by kleiton0x00

A cheat sheet that contains advanced queries for SQL Injection of all types.

cheatsheet mssql-dump mysql-injection
3015
View Details
msldap

msldap

by skelsec

LDAP library for auditing MS AD

security tool
435
View Details
Verified
Empire

Empire

by BC-SECURITY

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

c2 empire hacktoberfest
4619
View Details
Verified
merlin

merlin

by Ne0nd0g

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

agent c2 command-and-control
5257
View Details
PoshC2

PoshC2

by nettitude

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

c2 csharp nettitude
1933
View Details
MobSecco

MobSecco

by Anof-cyber

Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins

android apk bug-bounty
84
View Details
Featured
bytecode-viewer

bytecode-viewer

by Konloch

A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)

android apk baksmali
15038
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.