Less Googling, More Hacking!

334 InfoSec Tools in Our Directory

334 Tools in InfoSec Tools

New
web_app_recon_ci-cd_public

web_app_recon_ci-cd_public

by onurcangnc

This project delivers a fully automated **Recon-as-Code** workflow for passive reconnaissance for web application environments. It combines GitHub Actions-based CI/CD automation, powerful recon tools, and a Flask-powered dashboard for visualized and authenticated access to the findings.

security
0
View Details
New
elastic_leak_app

elastic_leak_app

by onurcangnc

a basic web application for data leak search.

security
2
View Details
New
smb_discovery

smb_discovery

by onurcangnc

a real-world reconnaissance against SMB discovery automation

security
1
View Details
New
S3BucketMisconf

S3BucketMisconf

by Atharv834

S3BucketMisconf is an advanced tool designed to scan AWS S3 buckets for misconfigurations. It identifies publicly accessible buckets, checks permissions, and detects sensitive data leaks. Ideal for bug bounty hunters and pentesters, it automates the recon process and enhances cloud storage security assessment efficiently.

security
32
View Details
Featured
atomic-red-team

atomic-red-team

by redcanaryco

Small and highly portable detection tests based on MITRE's ATT&CK.

mitre mitre-attack
10608
View Details
Featured
evilginx2

evilginx2

by kgretzky

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

security tool
13094
View Details
CVE-2017-0199

CVE-2017-0199

by bhdresh

Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

security tool
726
View Details
CVE-2017-8759

CVE-2017-8759

by bhdresh

Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

security tool
316
View Details
Verified
shad0w

shad0w

by bats3c

A post exploitation framework designed to operate covertly on heavily monitored environments

c c2 docker
2096
View Details
o365recon

o365recon

by nyxgeek

retrieve information via O365 and AzureAD with a valid cred

azure azuread hacking
719
View Details
RedTeaming_CheatSheet

RedTeaming_CheatSheet

by 0xJs

Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.

security tool
1406
View Details
Verified
osmedeus

osmedeus

by j3ssie

A Workflow Engine for Offensive Security

attack-surface attack-surface-management bug-bounty
5606
View Details
Gf-Patterns

Gf-Patterns

by 1ndianl33t

GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep

security tool
1315
View Details
Verified
snallygaster

snallygaster

by hannob

Tool to scan for secret files on HTTP servers

security tool
2089
View Details
ChopChop

ChopChop

by michelin

ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.

devsecops scanning security
691
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.