Less Googling, More Hacking!

381 InfoSec Tools in Our Directory

43 Tools in Red Team

NTDLLReflection

NTDLLReflection

by SaadAhla

Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table

security tool
297
View Details
kernel-exploit-factory

kernel-exploit-factory

by bsauce

Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.

security tool
1240
View Details
NovaHypervisor

NovaHypervisor

by Idov31

NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory.

blue-team blueteam cpp
103
View Details
RollerRoaster

RollerRoaster

by Extravenger

Tool for performing enumeration and exploitation of Kerberoasting attack in Active Directory

security
2
View Details
BetterNetLoader

BetterNetLoader

by racoten

A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints

security
92
View Details
Red-Team-Management

Red-Team-Management

by CyberSecurityUP

All thing red team resources and documents.

security tool
858
View Details
ShadowDropper

ShadowDropper

by EvilWhales

ShadowDropper is a utility for covertly delivering and executing payloads on a target system.

security tool
6
View Details
New
VEHNetLoader

VEHNetLoader

by patrickt2017

Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies

security tool
25
View Details
NetProbe

NetProbe

by HalilDeniz

NetProbe: Network Probe

arp arp-discover arp-scanner
161
View Details
FluxER

FluxER

by 0n1cOn3

FluxER - The bash script which installs and runs the Fluxion tool inside Termux. The wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.

android bash bash-script
639
View Details
Verified
Villain

Villain

by t3l3machus

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).

c2 cybersecurity hacking
4140
View Details
Verified
reverse-shell-generator

reverse-shell-generator

by 0dayCTF

Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)

ctf generator hacking
3440
View Details
PS2

PS2

by nccgroup

A port scanner written purely in PowerShell.

portscan portscanner portscanning
79
View Details
mapcidr

mapcidr

by projectdiscovery

Utility program to perform multiple operations for a given subnet/CIDR ranges.

cidr cidr-ranges subnetting
1111
View Details
Featured
routersploit

routersploit

by threat9

Exploitation Framework for Embedded Devices

bruteforce creds dictionary-attack
12617
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.