Try searching for "database", "file", "API", or browse by category
381 Tools in InfoSec Tools
MCPSpy
by alex-ilgayev
MCP Monitoring with eBPF
NTDLLReflection
by SaadAhla
Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table
kernel-exploit-factory
by bsauce
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
llm-sec
by tomabai
A hands-on learning platform for understanding and testing LLM security vulnerabilities
jwtauditor
by dr34mhacks
JWT Auditor – Analyze, break, and understand your tokens like a pro.
NovaHypervisor
by Idov31
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory.
RollerRoaster
by Extravenger
Tool for performing enumeration and exploitation of Kerberoasting attack in Active Directory
BetterNetLoader
by racoten
A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints
CVE-2023-22960
by t3l3machus
This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.
jadx-mcp-plugin
by mobilehackinglab
This project provides a Jadx plugin written in Java, which exposes the Jadx API over HTTP — enabling live interaction through MCP clients like Claude via the Model Context Protocol (MCP). GitHub Stats: - Stars: 69 - Forks: 8 - Issues: 0 - Contributors: 2 - Updated: 2025-07-05
Red-Team-Management
by CyberSecurityUP
All thing red team resources and documents.
ShadowDropper
by EvilWhales
ShadowDropper is a utility for covertly delivering and executing payloads on a target system.
ELcazad0r-XSS
by nihaltikka
A powerful and comprehensive XSS vulnerability scanner with an intuitive GUI interface.
VEHNetLoader
by patrickt2017
Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies
zin-mcp-client
by zinja-coder
MCP Client which serves as bridge between mcp servers and local LLMs running on Ollama, Created for MCP Servers Developed by Me, However other MCP Servers may run as well
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.