Try searching for "database", "file", "API", or browse by category
313 Tools in InfoSec Tools
allsafe
by t0thkr1s
Intentionally vulnerable Android application.
sadcloud
by nccgroup
A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure
iam-vulnerable
by BishopFox
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.
AzureGoat
by ine-labs
AzureGoat : A Damn Vulnerable Azure Infrastructure
AWSGoat
by ine-labs
AWSGoat : A Damn Vulnerable AWS Infrastructure
wrongsecrets
by OWASP
Vulnerable app with examples showing how to not use secrets
cdkgoat
by bridgecrewio
CdkGoat is Bridgecrew's "Vulnerable by Design" AWS CDK repository. CdkGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.
PetitPotam
by topotam
PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.
smbclient-ng
by p0dalirius
smbclient-ng, a fast and user friendly way to interact with SMB shares.
SCShell
by Mr-Un1k0d3r
Fileless lateral movement tool that relies on ChangeServiceConfigA to run command
CVEs
by RhinoSecurityLabs
Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs
CVE-2025-2563
by ubaydev
CVE-2025-2563 PoC
CVE-2025-0282-Ivanti-exploit
by absholi7ly
CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.
CVE-2025-0054
by z3usx01
A lightweight Python tool to detect stored Cross-Site Scripting (XSS) vulnerabilities in SAP NetWeaver Application Server Java, specifically targeting CVE-2025-0054.
andriller
by den4uk
📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.