Less Googling, More Hacking!

294 InfoSec Tools in Our Directory

65 Tools in Bug Bounty

burp_bug_finder

burp_bug_finder

by lucsemassa

Automatic Bug finder with buprsuite

security tool
166
View Details
apidetector

apidetector

by brinhosa

APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.

security tool
315
View Details
New
Recon-Search-Assistant

Recon-Search-Assistant

by Boopath1

A powerful and intuitive web-based search engine designed specifically for bug bounty hunters and security researchers. This tool provides quick access to various Google dorks and specialized searches to help identify potential security vulnerabilities and gather information about target domains.

security
0
View Details
New
urlF

urlF

by Boopath1

My script stands out by preserving the structure of duplicate URLs and handling complex query parameters, unlike standard tools that only filter alphabetically or deduplicate.

security
4
View Details
ipsourcebypass

ipsourcebypass

by p0dalirius

This Python script can be used to bypass IP source restrictions using HTTP headers.

bugbounty bypass headers
383
View Details
New
InterceptSuite

InterceptSuite

by Anof-cyber

A powerful SOCKS5 proxy based network traffic interception tool for Windows that enables TLS/SSL inspection, analysis, and manipulation at the network level.

cybersecurity interceptor network-analysis
11
View Details
New
web_app_recon_ci-cd_public

web_app_recon_ci-cd_public

by onurcangnc

This project delivers a fully automated **Recon-as-Code** workflow for passive reconnaissance for web application environments. It combines GitHub Actions-based CI/CD automation, powerful recon tools, and a Flask-powered dashboard for visualized and authenticated access to the findings.

security
0
View Details
New
S3BucketMisconf

S3BucketMisconf

by Atharv834

S3BucketMisconf is an advanced tool designed to scan AWS S3 buckets for misconfigurations. It identifies publicly accessible buckets, checks permissions, and detects sensitive data leaks. Ideal for bug bounty hunters and pentesters, it automates the recon process and enhances cloud storage security assessment efficiently.

security
32
View Details
Verified
osmedeus

osmedeus

by j3ssie

A Workflow Engine for Offensive Security

attack-surface attack-surface-management bug-bounty
5606
View Details
Gf-Patterns

Gf-Patterns

by 1ndianl33t

GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep

security tool
1315
View Details
Verified
snallygaster

snallygaster

by hannob

Tool to scan for secret files on HTTP servers

security tool
2089
View Details
ChopChop

ChopChop

by michelin

ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.

devsecops scanning security
691
View Details
Verified
ParamSpider

ParamSpider

by devanshbatham

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

bugbounty content-discovery fuzzing
2746
View Details
Verified
bbot

bbot

by blacklanternsecurity

The recursive internet scanner for hackers. 🧡

asm attack-surface-management automation
8517
View Details
Verified
knock

knock

by guelfoweb

Knock Subdomain Scan

security tool
4000
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.