Try searching for "database", "file", "API", or browse by category
33 Tools in Active Directory
PsMapExec
by The-Viper-One
Dominate Active Directory with PowerShell.
RustHound-CE
by g0h4n
Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀
Invoke-ADEnum
by Leo4j
Active Directory Auditing and Enumeration
chisel
by jpillora
A fast TCP/UDP tunnel over HTTP
ntlm_theft
by Greenwolf
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
Windows-Local-Privilege-Escalation-Cookbook
by nickvourd
Windows Local Privilege Escalation Cookbook
Invoke-PassTheCert
by The-Viper-One
Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel
FindOldSIDTraces
by TheManticoreProject
A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory
PKINITtools
by dirkjanm
Tools for Kerberos PKINIT and relaying to AD CS
ForgeCert
by GhostPack
"Golden" certificates
DonPAPI
by login-securite
Dumping DPAPI credz remotely
SharpRBCD
by Kryp7os
An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD
smb_discovery
by onurcangnc
a real-world reconnaissance against SMB discovery automation
ldapdomaindump
by dirkjanm
Active Directory information dumper via LDAP
autoNTDS
by hmaverickadams
autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.