Try searching for "database", "file", "API", or browse by category
334 Tools in InfoSec Tools
PoshC2
by nettitude
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
MobSecco
by Anof-cyber
Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins
bytecode-viewer
by Konloch
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
Krakatau
by Storyyeller
Java decompiler, assembler, and disassembler
GDA-android-reversing-Tool
by charles2gan
the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, data decryption, and encryption, etc.
PEASS-ng
by peass-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
frida-script-gen
by thecybersandeep
Generate Frida bypass scripts for Android APK root and SSL checks.
awesome-bugbounty-builder
by 0xJin
Awesome Bug bounty builder Project
awesome-oneliner-bugbounty
by dwisiswant0
A collection of awesome one-liner scripts especially for bug bounty tips.
RedCloud-OS
by RedTeamOperations
RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)
newtowner
by assetnote
Abuse trust-boundaries to bypass firewalls and network controls
Noriben
by Rurik
Noriben - Portable, Simple, Malware Analysis Sandbox
burp_bug_finder
by lucsemassa
Automatic Bug finder with buprsuite
apidetector
by brinhosa
APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.
Recon-Search-Assistant
by Boopath1
A powerful and intuitive web-based search engine designed specifically for bug bounty hunters and security researchers. This tool provides quick access to various Google dorks and specialized searches to help identify potential security vulnerabilities and gather information about target domains.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.