Less Googling, More Hacking!

334 InfoSec Tools in Our Directory

334 Tools in InfoSec Tools

New
urlF

urlF

by Boopath1

My script stands out by preserving the structure of duplicate URLs and handling complex query parameters, unlike standard tools that only filter alphabetically or deduplicate.

security
4
View Details
Featured
scrcpy

scrcpy

by Genymobile

Display and control your Android device

android c ffmpeg
123075
View Details
IWA-Java

IWA-Java

by fortify

Insecure Web + API application with example Fortify integrations into many DevSecOps and CICD platforms

fortify-integration-sample vulnerable-sample-app
2
View Details
IWA-DotNet

IWA-DotNet

by fortify

Insecure Web Application - .NET version

devsecops fortify-integration-sample vulnerable-sample-app
5
View Details
damn-vulnerable-MCP-server

damn-vulnerable-MCP-server

by harishsg993010

Damn Vulnerable MCP Server

security tool
1006
View Details
Sponsored
apk-components-inspector

apk-components-inspector

by thecybersandeep

A lightweight Python-based tool to extract and enumerate exported Android components (activities, services, receivers, providers), parse real intent extras from Smali code, and automatically generate practical ADB commands for pentesting. GitHub Stats: - Stars: 17 - Forks: 3 - Issues: 0 - Contributors: 1 - Updated: 2025-06-03

security tool
17
View Details
Verified
honggfuzz

honggfuzz

by google

Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)

c fuzzing security
3187
View Details
DonPAPI

DonPAPI

by login-securite

Dumping DPAPI credz remotely

dpapi password
1126
View Details
SharpRBCD

SharpRBCD

by Kryp7os

An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD

security
47
View Details
Deobfuscate-android-app

Deobfuscate-android-app

by In3tinct

LLM tool to find any potential vulnerabilities in android apps and deobfuscate android app code.

security tool
111
View Details
Verified
Snapdroid

Snapdroid

by dr34mhacks

Android Snapshot and recording tool

adb android android-bug-bounty
9
View Details
ipsourcebypass

ipsourcebypass

by p0dalirius

This Python script can be used to bypass IP source restrictions using HTTP headers.

bugbounty bypass headers
383
View Details
New
filter-shell

filter-shell

by tuckerweibell

Interactive CLI tool for exploiting LFI via PHP filter chaining — a wrapper around Synacktiv’s php_filter_chain_generator.

security tool
6
View Details
New
InterceptSuite

InterceptSuite

by Anof-cyber

A powerful SOCKS5 proxy based network traffic interception tool for Windows that enables TLS/SSL inspection, analysis, and manipulation at the network level.

cybersecurity interceptor network-analysis
11
View Details
New
Lodestar-Forge

Lodestar-Forge

by c0nf1den71al

Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.

security
44
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.