Try searching for "database", "file", "API", or browse by category
10 Tools in Resources
RedTeaming_CheatSheet
by 0xJs
Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.
SecPayloads
by ogh-bnz
Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration testing, collected in one place. List types include xss, sqli, sensitive data patterns, fuzzing payloads, web shells, and many more.
BugBountyBooks
by akr3ch
A collection of PDF/books about the modern web application security and bug bounty.
Awesome-SOC
by SOC-Community
A collection of sources of documentation and best practices to build and run a SOC
awesome-mobile-security
by vaib25vicky
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Android-Pentesting
by pollonegro
Android Pentesting - Methodology, tools...
AllThingsAndroid
by jdonsec
A Collection of Android Pentest Learning Materials
Mobile-App-Pentest
by kyawthiha7
Mobile Security Resources
awesome-android-security
by saeidshirazi
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
Android-Reports-and-Resources
by B3nac
A big list of Android Hackerone disclosed reports and other resources.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.