Try searching for "database", "file", "API", or browse by category
77 Tools in Bug Bounty
nuclei
by projectdiscovery
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the internet. It helps you find vulnerabilities in your applications, APIs, networks, DNS, and cloud configurations.
gospider
by jaeles-project
Gospider - Fast web spider written in Go
ctfr
by UnaPibaGeek
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
gau
by lc
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
waybackurls
by tomnomnom
Fetch all the URLs that the Wayback Machine knows about for a domain
amass
by owasp-amass
In-depth attack surface mapping and asset discovery
GraphQLmap
by swisskyrepo
GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)
XSRFProbe
by 0xInfection
The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
Injectus
by dubs3c
CRLF and open redirect fuzzer
Corsy
by s0md3v
CORS Misconfiguration Scanner
fav-up
by pielco11
IP lookup by favicon using Shodan
crlfuzz
by dwisiswant0
A fast tool to scan CRLF vulnerability written in Go
gauplus
by bp0lr
Gau Plus
unimap
by Edu4rdSHL
Scan only once by IP address and reduce scan times with Nmap for large amounts of data.
gotator
by Josue87
Gotator is a tool to generate DNS wordlists through permutations.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.