Try searching for "database", "file", "API", or browse by category
77 Tools in Bug Bounty
csprecon
by edoardottt
Discover new target domains using Content Security Policy
favirecon
by edoardottt
Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
4-ZERO-3
by Dheerajmadhukar
403/401 Bypass Methods + Bash Automation + Your Support ;)
back-me-up
by Dheerajmadhukar
This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filter everything accordingly.
recox
by samhaxr
Master script for web reconnaissance
socialhunter
by utkusen
crawls the website and finds broken social media links that can be hijacked
jxscout
by francisconeves97
jxscout superpowers JavaScript analysis for security researchers
aem-hacker
by 0ang3el
An MCP server implementation
SubEnum
by bing0o
bash script for Subdomain Enumeration
SecretFinder
by m4ll0k
SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files
LinkFinder
by GerbenJavado
A python script that finds endpoints in JavaScript files
dnsx
by projectdiscovery
dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.
assetfinder
by tomnomnom
Find domains and subdomains related to a given domain
Sublist3r
by aboul3la
Fast subdomains enumeration tool for penetration testers
dalfox
by hahwul
🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.