Less Googling, More Hacking!

382 InfoSec Tools in Our Directory

382 Tools in InfoSec Tools

New
filter-shell

filter-shell

by tuckerweibell

Interactive CLI tool for exploiting LFI via PHP filter chaining — a wrapper around Synacktiv’s php_filter_chain_generator.

security tool
6
View Details
New
InterceptSuite

InterceptSuite

by Anof-cyber

A powerful SOCKS5 proxy based network traffic interception tool for Windows that enables TLS/SSL inspection, analysis, and manipulation at the network level.

cybersecurity interceptor network-analysis
11
View Details
New
Lodestar-Forge

Lodestar-Forge

by c0nf1den71al

Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.

security
44
View Details
New
web_app_recon_ci-cd_public

web_app_recon_ci-cd_public

by onurcangnc

This project delivers a fully automated **Recon-as-Code** workflow for passive reconnaissance for web application environments. It combines GitHub Actions-based CI/CD automation, powerful recon tools, and a Flask-powered dashboard for visualized and authenticated access to the findings.

security
0
View Details
New
smb_discovery

smb_discovery

by onurcangnc

a real-world reconnaissance against SMB discovery automation

security
1
View Details
New
elastic_leak_app

elastic_leak_app

by onurcangnc

a basic web application for data leak search.

security
2
View Details
New
S3BucketMisconf

S3BucketMisconf

by Atharv834

S3BucketMisconf is an advanced tool designed to scan AWS S3 buckets for misconfigurations. It identifies publicly accessible buckets, checks permissions, and detects sensitive data leaks. Ideal for bug bounty hunters and pentesters, it automates the recon process and enhances cloud storage security assessment efficiently.

security
32
View Details
Featured
atomic-red-team

atomic-red-team

by redcanaryco

Small and highly portable detection tests based on MITRE's ATT&CK.

mitre mitre-attack
10608
View Details
Featured
evilginx2

evilginx2

by kgretzky

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

security tool
13094
View Details
CVE-2017-0199

CVE-2017-0199

by bhdresh

Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

security tool
726
View Details
CVE-2017-8759

CVE-2017-8759

by bhdresh

Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

security tool
316
View Details
Verified
shad0w

shad0w

by bats3c

A post exploitation framework designed to operate covertly on heavily monitored environments

c c2 docker
2096
View Details
o365recon

o365recon

by nyxgeek

retrieve information via O365 and AzureAD with a valid cred

azure azuread hacking
719
View Details
RedTeaming_CheatSheet

RedTeaming_CheatSheet

by 0xJs

Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.

security tool
1406
View Details
Verified
osmedeus

osmedeus

by j3ssie

A Workflow Engine for Offensive Security

attack-surface attack-surface-management bug-bounty
5606
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.