Try searching for "database", "file", "API", or browse by category
18 Tools in Digital Forensics
MacFIRE
by Masriyan
MacFIRE – (Mac Forensic Investigation & Response Engine)
FOCA
by ElevenPaths
Tool to find metadata and hidden information in the documents.
volatility
by volatilityfoundation
An advanced memory forensics framework
LogonTracer
by JPCERTCC
Investigate malicious Windows logon by visualizing and analyzing Windows event log
grr
by google
GRR Rapid Response: remote live forensics for incident response
Kuiper
by DFIRKuiper
Digital Forensics Investigation Platform
intelmq
by certtools
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
avml
by microsoft
AVML - Acquire Volatile Memory for Linux
tapir
by tap-ir
TAPIR is a multi-user, client/server, incident response framework
steghide
by StegHigh
steganography program that hides data in various kinds of image and audio files
toolkit
by docker-forensics-toolkit
A toolkit for the post-mortem examination of Docker containers from forensic HDD copies
apfs-fuse
by sgan81
FUSE driver for APFS (Apple File System)
kismet
by kismetwireless
Github mirror of official Kismet repository
RecuperaBit
by Lazza
A tool for forensic file system reconstruction.
ntfstool
by thewhiteninja
Forensics tool for NTFS (parser, mft, bitlocker, deleted files)
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.