Less Googling, More Hacking!

334 InfoSec Tools in Our Directory

334 Tools in InfoSec Tools

PoshC2

PoshC2

by nettitude

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

c2 csharp nettitude
1933
View Details
MobSecco

MobSecco

by Anof-cyber

Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins

android apk bug-bounty
84
View Details
Featured
bytecode-viewer

bytecode-viewer

by Konloch

A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)

android apk baksmali
15038
View Details
Verified
Krakatau

Krakatau

by Storyyeller

Java decompiler, assembler, and disassembler

security tool
2091
View Details
Verified
GDA-android-reversing-Tool

GDA-android-reversing-Tool

by charles2gan

the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, data decryption, and encryption, etc.

decompiler malware-analysis mobile-security
4460
View Details
Featured
PEASS-ng

PEASS-ng

by peass-ng

PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)

bash batch batch-script
17651
View Details
frida-script-gen

frida-script-gen

by thecybersandeep

Generate Frida bypass scripts for Android APK root and SSL checks.

security tool
33
View Details
awesome-bugbounty-builder

awesome-bugbounty-builder

by 0xJin

Awesome Bug bounty builder Project

security tool
662
View Details
Verified
awesome-oneliner-bugbounty

awesome-oneliner-bugbounty

by dwisiswant0

A collection of awesome one-liner scripts especially for bug bounty tips.

awesome bash bug-bounty
2853
View Details
RedCloud-OS

RedCloud-OS

by RedTeamOperations

RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers (CSPs)

security tool
637
View Details
newtowner

newtowner

by assetnote

Abuse trust-boundaries to bypass firewalls and network controls

security tool
91
View Details
Noriben

Noriben

by Rurik

Noriben - Portable, Simple, Malware Analysis Sandbox

security tool
1157
View Details
burp_bug_finder

burp_bug_finder

by lucsemassa

Automatic Bug finder with buprsuite

security tool
166
View Details
apidetector

apidetector

by brinhosa

APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.

security tool
315
View Details
New
Recon-Search-Assistant

Recon-Search-Assistant

by Boopath1

A powerful and intuitive web-based search engine designed specifically for bug bounty hunters and security researchers. This tool provides quick access to various Google dorks and specialized searches to help identify potential security vulnerabilities and gather information about target domains.

security
0
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.