Less Googling, More Hacking!

294 InfoSec Tools in Our Directory

17 Tools in Red Team

New
Lodestar-Forge

Lodestar-Forge

by c0nf1den71al

Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.

security
44
View Details
Featured
atomic-red-team

atomic-red-team

by redcanaryco

Small and highly portable detection tests based on MITRE's ATT&CK.

mitre mitre-attack
10608
View Details
Featured
evilginx2

evilginx2

by kgretzky

Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication

security tool
13094
View Details
Verified
shad0w

shad0w

by bats3c

A post exploitation framework designed to operate covertly on heavily monitored environments

c c2 docker
2096
View Details
smbcrawler

smbcrawler

by SySS-Research

smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares

pentest red-team-tools shares
166
View Details
Verified
Havoc

Havoc

by HavocFramework

The Havoc Framework

security tool
7572
View Details
Verified
sliver

sliver

by BishopFox

Adversary Emulation Framework

adversarial-attacks adversary-simulation c2
9425
View Details
DojoLoader

DojoLoader

by naksyn

Generic PE loader for fast prototyping evasion techniques

cobalt-strike edr-evasion evasion
231
View Details
Nimbo-C2

Nimbo-C2

by itaymigdal

Nimbo-C2 is yet another (simple and lightweight) C2 framework

c2 c2-framework command-and-control
400
View Details
Sandman

Sandman

by Idov31

Sandman is a NTP based backdoor for red team engagements in hardened networks.

backdoor csharp cybersecurity
790
View Details
dnstwist

dnstwist

by hazcod

A tool to monitor for potential spear phishing domains and send to Slack.

detection dnstwist phishing
22
View Details
shell_bringer

shell_bringer

by onurcangnc

ShellBringer is a Python script designed for penetration testers. It facilitates the creation and management of reverse shell payloads, automating listener setup across multiple platforms.

security tool
4
View Details
New
evil-winrm-py

evil-winrm-py

by adityatelange

Execute commands interactively on remote Windows machines using the WinRM protocol

cli evil-winrm-py pentesting
4
View Details
ImpulsiveDLLHijack

ImpulsiveDLLHijack

by knight0x07

C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.

cybersecurity dll-hijacking redteam
521
View Details
Verified
linux-smart-enumeration

linux-smart-enumeration

by diego-treitos

Linux enumeration tool for pentesting and CTFs with verbosity levels

ctfs hacking hackthebox
3610
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.