Try searching for "database", "file", "API", or browse by category
14 Tools in Reverse Engineering
JPGtoMalware
by abdulkadir-gungor
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganog...
PufferRelay
by MPolymath
Pentesting tool to extract valuable information from .pcap (wireshark) files
pwndbg
by pwndbg
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
plasma
by plasma-disassembler
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
dnSpy
by dnSpy
.NET debugger and assembly editor
binwalk
by ReFirmLabs
Firmware Analysis Tool
voltron
by snare
A hacky debugger UI for hackers
UEFITool
by LongSoft
UEFI firmware image viewer and editor
ghidra
by NationalSecurityAgency
Ghidra is a software reverse engineering (SRE) framework
rvmi
by mandiant
rVMI - A New Paradigm For Full System Analysis
boxxy-rs
by kpcyrd
Linkable sandbox explorer
pyrebox
by Cisco-Talos
Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU
medusa
by wisk
An open source interactive disassembler
fridax
by NorthwaveSecurity
Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.