Try searching for "database", "file", "API", or browse by category
67 Tools in Bug Bounty
bbot
by blacklanternsecurity
The recursive internet scanner for hackers. 🧡
knock
by guelfoweb
Knock Subdomain Scan
shosubgo
by incogbyte
Small tool to Grab subdomains using Shodan api.
cero
by glebarez
Scrape domain names from SSL certificates of arbitrary hosts
hades
by joelindra
Automate your hacking
csprecon
by edoardottt
Discover new target domains using Content Security Policy
favirecon
by edoardottt
Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
4-ZERO-3
by Dheerajmadhukar
403/401 Bypass Methods + Bash Automation + Your Support ;)
back-me-up
by Dheerajmadhukar
This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filter everything accordingly.
recox
by samhaxr
Master script for web reconnaissance
socialhunter
by utkusen
crawls the website and finds broken social media links that can be hijacked
jxscout
by francisconeves97
jxscout superpowers JavaScript analysis for security researchers
aem-hacker
by 0ang3el
An MCP server implementation
SubEnum
by bing0o
bash script for Subdomain Enumeration
SecretFinder
by m4ll0k
SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.