Try searching for "database", "file", "API", or browse by category
45 Tools in Vulnerable Labs
skf-labs
by blabla1337
Repo for all the SKF Docker lab examples
Damn-Vulnerable-GraphQL-Application
by dolevf
Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security.
exploit-workshop
by snyk-labs
A step by step workshop to exploit various vulnerabilities in Node.js and Java applications
dvws-node
by snoopysecurity
Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API related vulnerabilities.
dvwp
by vavkamil
Damn Vulnerable WordPress
docker-java-xxe
by pimps
Docker image to test XXE attacks in java with tomcat.
xxelab
by jbarone
A simple web app with a XXE vulnerability.
xssable
by kiwicom
A vulnerable blogging platform used to demonstrate XSS vulnerabilities.
yavdb
by rtfpessoa
Yet Another Vulnerability Database
DSVW
by stamparm
Damn Small Vulnerable Web
bWAPP
by raesene
An MCP server implementation
xvwa
by s4n7h0
XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security.
VAmPI
by erev0s
Vulnerable REST API with OWASP top 10 vulnerabilities for security testing
VulnLab
by Yavuzlar
An MCP server implementation
pentest_lab
by oliverwiegers
Local penetration testing lab using docker-compose.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.