Try searching for "database", "file", "API", or browse by category
381 Tools in InfoSec Tools
WebSift
by s-r-e-e-r-a-j
WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from websites. It is developed for Termux and Linux-based systems
NetProbe
by HalilDeniz
NetProbe: Network Probe
JPGtoMalware
by abdulkadir-gungor
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganog...
xurlfind3r
by hueristiq
A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
FluxER
by 0n1cOn3
FluxER - The bash script which installs and runs the Fluxion tool inside Termux. The wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
ignorant
by megadose
ignorant allows you to check if a phone number is used on different sites like snapchat, instagram.
apk-components-inspector
by thecybersandeep
A lightweight Python-based tool to extract and enumerate exported Android components (activities, services, receivers, providers), parse real intent extras from Smali code, and automatically generate practical ADB commands for pentesting. GitHub Stats: - Stars: 17 - Forks: 3 - Issues: 0 - Contributors: 1 - Updated: 2025-06-03
Villain
by t3l3machus
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
toxssin
by t3l3machus
An XSS exploitation command-line interface and payload generator.
Nuclei-AI-Prompts
by reewardius
Nuclei-AI-Prompts
reverse-shell-generator
by 0dayCTF
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
PS2
by nccgroup
A port scanner written purely in PowerShell.
BugBountyScanner
by chvancooten
A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.
owasp-masvs
by OWASP
The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.
mapcidr
by projectdiscovery
Utility program to perform multiple operations for a given subnet/CIDR ranges.
Infosec Certifications Resources
Discover the best cybersecurity certifications to advance your career








































Frequently Asked Questions about InfosecMania
Learn more about Cybersecurity Tools and how they can enhance your security posture
InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.
You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.
Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].
Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.
We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.
We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.