Less Googling, More Hacking!

381 InfoSec Tools in Our Directory

77 Tools in Bug Bounty

New
urlF

urlF

by Boopath1

My script stands out by preserving the structure of duplicate URLs and handling complex query parameters, unlike standard tools that only filter alphabetically or deduplicate.

security
4
View Details
ipsourcebypass

ipsourcebypass

by p0dalirius

This Python script can be used to bypass IP source restrictions using HTTP headers.

bugbounty bypass headers
383
View Details
New
InterceptSuite

InterceptSuite

by Anof-cyber

A powerful SOCKS5 proxy based network traffic interception tool for Windows that enables TLS/SSL inspection, analysis, and manipulation at the network level.

cybersecurity interceptor network-analysis
11
View Details
New
web_app_recon_ci-cd_public

web_app_recon_ci-cd_public

by onurcangnc

This project delivers a fully automated **Recon-as-Code** workflow for passive reconnaissance for web application environments. It combines GitHub Actions-based CI/CD automation, powerful recon tools, and a Flask-powered dashboard for visualized and authenticated access to the findings.

security
0
View Details
New
S3BucketMisconf

S3BucketMisconf

by Atharv834

S3BucketMisconf is an advanced tool designed to scan AWS S3 buckets for misconfigurations. It identifies publicly accessible buckets, checks permissions, and detects sensitive data leaks. Ideal for bug bounty hunters and pentesters, it automates the recon process and enhances cloud storage security assessment efficiently.

security
32
View Details
Verified
osmedeus

osmedeus

by j3ssie

A Workflow Engine for Offensive Security

attack-surface attack-surface-management bug-bounty
5606
View Details
Gf-Patterns

Gf-Patterns

by 1ndianl33t

GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep

security tool
1315
View Details
Verified
snallygaster

snallygaster

by hannob

Tool to scan for secret files on HTTP servers

security tool
2089
View Details
ChopChop

ChopChop

by michelin

ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.

devsecops scanning security
691
View Details
Verified
ParamSpider

ParamSpider

by devanshbatham

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

bugbounty content-discovery fuzzing
2746
View Details
Verified
bbot

bbot

by blacklanternsecurity

The recursive internet scanner for hackers. 🧡

asm attack-surface-management automation
8517
View Details
Verified
knock

knock

by guelfoweb

Knock Subdomain Scan

security tool
4000
View Details
shosubgo

shosubgo

by incogbyte

Small tool to Grab subdomains using Shodan api.

golang grab-subdomains shodan
457
View Details
cero

cero

by glebarez

Scrape domain names from SSL certificates of arbitrary hosts

domain-names recon scrape
648
View Details
New
hades

hades

by joelindra

Automate your hacking

security
2
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.