Less Googling, More Hacking!

294 InfoSec Tools in Our Directory

294 Tools in InfoSec Tools

newtowner

newtowner

by assetnote

Abuse trust-boundaries to bypass firewalls and network controls

security tool
91
View Details
Noriben

Noriben

by Rurik

Noriben - Portable, Simple, Malware Analysis Sandbox

security tool
1157
View Details
burp_bug_finder

burp_bug_finder

by lucsemassa

Automatic Bug finder with buprsuite

security tool
166
View Details
apidetector

apidetector

by brinhosa

APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.

security tool
315
View Details
New
Recon-Search-Assistant

Recon-Search-Assistant

by Boopath1

A powerful and intuitive web-based search engine designed specifically for bug bounty hunters and security researchers. This tool provides quick access to various Google dorks and specialized searches to help identify potential security vulnerabilities and gather information about target domains.

security
0
View Details
New
urlF

urlF

by Boopath1

My script stands out by preserving the structure of duplicate URLs and handling complex query parameters, unlike standard tools that only filter alphabetically or deduplicate.

security
4
View Details
Featured
scrcpy

scrcpy

by Genymobile

Display and control your Android device

android c ffmpeg
123075
View Details
IWA-Java

IWA-Java

by fortify

Insecure Web + API application with example Fortify integrations into many DevSecOps and CICD platforms

fortify-integration-sample vulnerable-sample-app
2
View Details
IWA-DotNet

IWA-DotNet

by fortify

Insecure Web Application - .NET version

devsecops fortify-integration-sample vulnerable-sample-app
5
View Details
damn-vulnerable-MCP-server

damn-vulnerable-MCP-server

by harishsg993010

Damn Vulnerable MCP Server

security tool
1006
View Details
Sponsored
apk-components-inspector

apk-components-inspector

by thecybersandeep

A lightweight Python-based tool to extract and enumerate exported Android components (activities, services, receivers, providers), parse real intent extras from Smali code, and automatically generate practical ADB commands for pentesting. GitHub Stats: - Stars: 17 - Forks: 3 - Issues: 0 - Contributors: 1 - Updated: 2025-06-03

security tool
17
View Details
Verified
honggfuzz

honggfuzz

by google

Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)

c fuzzing security
3187
View Details
DonPAPI

DonPAPI

by login-securite

Dumping DPAPI credz remotely

dpapi password
1126
View Details
SharpRBCD

SharpRBCD

by Kryp7os

An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD

security
47
View Details
Deobfuscate-android-app

Deobfuscate-android-app

by In3tinct

LLM tool to find any potential vulnerabilities in android apps and deobfuscate android app code.

security tool
111
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.