Less Googling, More Hacking!

381 InfoSec Tools in Our Directory

77 Tools in Bug Bounty

Verified
jwtauditor

jwtauditor

by dr34mhacks

JWT Auditor – Analyze, break, and understand your tokens like a pro.

jwt jwt-auth jwt-hacking
48
View Details
xurlfind3r

xurlfind3r

by hueristiq

A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.

bug-bounty bug-bounty-tools contentdiscovery
615
View Details
Nuclei-AI-Prompts

Nuclei-AI-Prompts

by reewardius

Nuclei-AI-Prompts

security tool
203
View Details
BugBountyScanner

BugBountyScanner

by chvancooten

A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.

bug-bounty-reconnaissance bugbounty docker-image
906
View Details
unfurl

unfurl

by tomnomnom

Pull out bits of URLs provided on stdin

security tool
1189
View Details
http-request-smuggling

http-request-smuggling

by anshumanpattnaik

HTTP Request Smuggling Detection Tool

blackhat chunked-encoding content-length
512
View Details
clairvoyance

clairvoyance

by nikitastupin

Obtain GraphQL API schema even if the introspection is disabled

bug-bounty graphql penetration-testing
1219
View Details
New
ZoomeyeSearch

ZoomeyeSearch

by RevoltSecurities

A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.

security tool
26
View Details
New
NucleiPrompt

NucleiPrompt

by AryaSec1337

Nuclei Prompt Scanner adalah tools berbasis Python yang memanfaatkan Nuclei dan AI Prompting untuk melakukan pemindaian kerentanan pada web target berdasarkan kategori OWASP dan lainnya, dengan antarmuka interaktif berbasis CLI (command-line).

security
0
View Details
Verified
altdns

altdns

by infosec-au

Generates permutations, alterations and mutations of subdomains and then resolves them

security tool
2417
View Details
awesome-bugbounty-builder

awesome-bugbounty-builder

by 0xJin

Awesome Bug bounty builder Project

security tool
662
View Details
Verified
awesome-oneliner-bugbounty

awesome-oneliner-bugbounty

by dwisiswant0

A collection of awesome one-liner scripts especially for bug bounty tips.

awesome bash bug-bounty
2853
View Details
burp_bug_finder

burp_bug_finder

by lucsemassa

Automatic Bug finder with buprsuite

security tool
166
View Details
apidetector

apidetector

by brinhosa

APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.

security tool
315
View Details
New
Recon-Search-Assistant

Recon-Search-Assistant

by Boopath1

A powerful and intuitive web-based search engine designed specifically for bug bounty hunters and security researchers. This tool provides quick access to various Google dorks and specialized searches to help identify potential security vulnerabilities and gather information about target domains.

security
0
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.