Less Googling, More Hacking!

381 InfoSec Tools in Our Directory

381 Tools in InfoSec Tools

MCPSpy

MCPSpy

by alex-ilgayev

MCP Monitoring with eBPF

ai ai-security llm
109
View Details
NTDLLReflection

NTDLLReflection

by SaadAhla

Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle to ntdll , and trigger exported APIs from the export table

security tool
297
View Details
kernel-exploit-factory

kernel-exploit-factory

by bsauce

Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.

security tool
1240
View Details
llm-sec

llm-sec

by tomabai

A hands-on learning platform for understanding and testing LLM security vulnerabilities

security tool
3
View Details
Verified
jwtauditor

jwtauditor

by dr34mhacks

JWT Auditor – Analyze, break, and understand your tokens like a pro.

jwt jwt-auth jwt-hacking
48
View Details
NovaHypervisor

NovaHypervisor

by Idov31

NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory.

blue-team blueteam cpp
103
View Details
RollerRoaster

RollerRoaster

by Extravenger

Tool for performing enumeration and exploitation of Kerberoasting attack in Active Directory

security
2
View Details
BetterNetLoader

BetterNetLoader

by racoten

A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints

security
92
View Details
CVE-2023-22960

CVE-2023-22960

by t3l3machus

This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.

bruteforce cve-2023-22960 hacking
87
View Details
Verified
jadx-mcp-plugin

jadx-mcp-plugin

by mobilehackinglab

This project provides a Jadx plugin written in Java, which exposes the Jadx API over HTTP — enabling live interaction through MCP clients like Claude via the Model Context Protocol (MCP). GitHub Stats: - Stars: 69 - Forks: 8 - Issues: 0 - Contributors: 2 - Updated: 2025-07-05

security tool
69
View Details
Red-Team-Management

Red-Team-Management

by CyberSecurityUP

All thing red team resources and documents.

security tool
858
View Details
ShadowDropper

ShadowDropper

by EvilWhales

ShadowDropper is a utility for covertly delivering and executing payloads on a target system.

security tool
6
View Details
ELcazad0r-XSS

ELcazad0r-XSS

by nihaltikka

A powerful and comprehensive XSS vulnerability scanner with an intuitive GUI interface.

security tool
0
View Details
New
VEHNetLoader

VEHNetLoader

by patrickt2017

Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies

security tool
25
View Details
zin-mcp-client

zin-mcp-client

by zinja-coder

MCP Client which serves as bridge between mcp servers and local LLMs running on Ollama, Created for MCP Servers Developed by Me, However other MCP Servers may run as well

ai cli-app cybersecurity-tools
63
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.