Less Googling, More Hacking!

294 InfoSec Tools in Our Directory

20 Tools in Cloud Security

newtowner

newtowner

by assetnote

Abuse trust-boundaries to bypass firewalls and network controls

security tool
91
View Details
o365recon

o365recon

by nyxgeek

retrieve information via O365 and AzureAD with a valid cred

azure azuread hacking
719
View Details
Verified
security_monkey

security_monkey

by Netflix

Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.

aws aws-ec2 aws-iam
4362
View Details
Verified
consoleme

consoleme

by Netflix

A Central Control Plane for AWS Permissions and Access

aws aws-iam cloud-security
3182
View Details
Verified
kics

kics

by Checkmarx

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.

appsec cloudnative devsecops
2302
View Details
Verified
pacu

pacu

by RhinoSecurityLabs

The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.

aws aws-security penetration-testing
4717
View Details
Verified
ScoutSuite

ScoutSuite

by nccgroup

Multi-Cloud Security Auditing Tool

auditing aws azure
7151
View Details
Featured
prowler

prowler

by prowler-cloud

Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more

aws azure cis-benchmark
11650
View Details
cloudmarker

cloudmarker

by cloudmarker

Cloud security monitoring tool and framework

azure cloud cloud-security
220
View Details
ElectricEye

ElectricEye

by jonrau1

ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring supporting 100s of services and evaluations to harden your CSP & SaaS environments with controls mapped to over 20 industry, regulatory, and best practice controls frameworks

asset-management attack-surface-management aws
992
View Details
matano

matano

by matanolabs

Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS

alerting apache-iceberg aws
1559
View Details
smogcloud

smogcloud

by BishopFox

Find cloud assets that no one wants exposed 🔎 ☁️

amazonaws api-documentation attack-surface
345
View Details
GCPBucketBrute

GCPBucketBrute

by RhinoSecurityLabs

A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.

security tool
519
View Details
Verified
cloudmapper

cloudmapper

by duo-labs

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

aws cytoscape diagram
6148
View Details
Verified
cloudsploit

cloudsploit

by aquasecurity

Cloud Security Posture Management (CSPM)

alibaba aqua aws
3526
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.