Try searching for "database", "file", "API", or browse by category
335 Tools in InfoSec Tools
linux-smart-enumeration
by diego-treitos
Linux enumeration tool for pentesting and CTFs with verbosity levels
Crassus
by vu-ls
An MCP server implementation
ligolo-ng
by nicocha30
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
ldapdomaindump
by dirkjanm
Active Directory information dumper via LDAP
autoNTDS
by hmaverickadams
autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat
juice-shop
by juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
vulhub
by vulhub
Pre-Built Vulnerable Environments Based on Docker-Compose
DVWA
by digininja
Damn Vulnerable Web Application (DVWA)
WebGoat
by WebGoat
WebGoat is a deliberately insecure application
sherlock
by sherlock-project
Hunt down social media accounts by username across social networks
kubernetes-goat
by madhuakula
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
cloudgoat
by RhinoSecurityLabs
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Certipy
by ly4k
Tool for Active Directory Certificate Services enumeration and abuse
kerbrute
by ropnop
A tool to perform Kerberos pre-auth bruteforcing
pwndrop
by kgretzky
Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.