Less Googling, More Hacking!

335 InfoSec Tools in Our Directory

335 Tools in InfoSec Tools

Verified
linux-smart-enumeration

linux-smart-enumeration

by diego-treitos

Linux enumeration tool for pentesting and CTFs with verbosity levels

ctfs hacking hackthebox
3610
View Details
Crassus

Crassus

by vu-ls

An MCP server implementation

security tool
572
View Details
Verified
ligolo-ng

ligolo-ng

by nicocha30

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

golang offensive-security pentest-tool
3503
View Details
ldapdomaindump

ldapdomaindump

by dirkjanm

Active Directory information dumper via LDAP

security tool
1264
View Details
autoNTDS

autoNTDS

by hmaverickadams

autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat

security tool
109
View Details
Featured
juice-shop

juice-shop

by juice-shop

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

24pullrequests application-security appsec
11282
View Details
Featured
vulhub

vulhub

by vulhub

Pre-Built Vulnerable Environments Based on Docker-Compose

docker docker-compose dockerfile
18922
View Details
Featured
DVWA

DVWA

by digininja

Damn Vulnerable Web Application (DVWA)

dvwa hacking infosec
11260
View Details
Verified
WebGoat

WebGoat

by WebGoat

WebGoat is a deliberately insecure application

security tool
7509
View Details
Featured
sherlock

sherlock

by sherlock-project

Hunt down social media accounts by username across social networks

cli cti cybersecurity
65680
View Details
Verified
kubernetes-goat

kubernetes-goat

by madhuakula

Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀

blueteam cloud-native cloud-security
4777
View Details
Verified
cloudgoat

cloudgoat

by RhinoSecurityLabs

CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool

security tool
3228
View Details
Verified
Certipy

Certipy

by ly4k

Tool for Active Directory Certificate Services enumeration and abuse

adcs pki
2830
View Details
Verified
kerbrute

kerbrute

by ropnop

A tool to perform Kerberos pre-auth bruteforcing

security tool
2920
View Details
Verified
pwndrop

pwndrop

by kgretzky

Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.

file-manager file-sharing http-server
2145
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.