Try searching for "database", "file", "API", or browse by category
19 Tools in Web Security
ELcazad0r-XSS
by nihaltikka
A powerful and comprehensive XSS vulnerability scanner with an intuitive GUI interface.
toxssin
by t3l3machus
An XSS exploitation command-line interface and payload generator.
words-scraper
by dariusztytko
Selenium based web scraper to generate passwords list
headi
by mlcsec
Customisable and automated HTTP header injection
archerysec
by archerysec
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
Advanced-SQL-Injection-Cheatsheet
by kleiton0x00
A cheat sheet that contains advanced queries for SQL Injection of all types.
filter-shell
by tuckerweibell
Interactive CLI tool for exploiting LFI via PHP filter chaining — a wrapper around Synacktiv’s php_filter_chain_generator.
ppmap
by kleiton0x00
A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.
wpprobe
by Chocapikk
A fast WordPress plugin enumeration tool
cariddi
by edoardottt
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
Raccoon
by evyatarmeged
A high performance offensive security tool for reconnaissance and vulnerability scanning
ghauri
by r0oth3x49
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
angularjs-csti-scanner
by tijme
Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.
web-check
by Lissy93
🕵️♂️ All-in-one OSINT tool for analysing any website
sqlmap
by sqlmapproject
Automatic SQL injection and database takeover tool
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.