Less Googling, More Hacking!

381 InfoSec Tools in Our Directory

381 Tools in InfoSec Tools

WebSift

WebSift

by s-r-e-e-r-a-j

WebSift is an OSINT ethical hacking tool designed to scrape and extract emails, phone numbers, and social media links or other URLs from websites. It is developed for Termux and Linux-based systems

bash bash-script bash-tool
124
View Details
NetProbe

NetProbe

by HalilDeniz

NetProbe: Network Probe

arp arp-discover arp-scanner
161
View Details
JPGtoMalware

JPGtoMalware

by abdulkadir-gungor

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganog...

abdulkadir abdulkadir-gungor converter-jpg
401
View Details
xurlfind3r

xurlfind3r

by hueristiq

A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.

bug-bounty bug-bounty-tools contentdiscovery
615
View Details
FluxER

FluxER

by 0n1cOn3

FluxER - The bash script which installs and runs the Fluxion tool inside Termux. The wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.

android bash bash-script
639
View Details
ignorant

ignorant

by megadose

ignorant allows you to check if a phone number is used on different sites like snapchat, instagram.

amazon instagram osint
1232
View Details
Sponsored
apk-components-inspector

apk-components-inspector

by thecybersandeep

A lightweight Python-based tool to extract and enumerate exported Android components (activities, services, receivers, providers), parse real intent extras from Smali code, and automatically generate practical ADB commands for pentesting. GitHub Stats: - Stars: 17 - Forks: 3 - Issues: 0 - Contributors: 1 - Updated: 2025-06-03

security tool
40
View Details
Verified
Villain

Villain

by t3l3machus

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).

c2 cybersecurity hacking
4140
View Details
toxssin

toxssin

by t3l3machus

An XSS exploitation command-line interface and payload generator.

cross-site-scripting exploitation hacking
1380
View Details
Nuclei-AI-Prompts

Nuclei-AI-Prompts

by reewardius

Nuclei-AI-Prompts

security tool
203
View Details
Verified
reverse-shell-generator

reverse-shell-generator

by 0dayCTF

Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)

ctf generator hacking
3440
View Details
PS2

PS2

by nccgroup

A port scanner written purely in PowerShell.

portscan portscanner portscanning
79
View Details
BugBountyScanner

BugBountyScanner

by chvancooten

A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.

bug-bounty-reconnaissance bugbounty docker-image
906
View Details
Verified
owasp-masvs

owasp-masvs

by OWASP

The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.

android-app audit gitbook
2182
View Details
mapcidr

mapcidr

by projectdiscovery

Utility program to perform multiple operations for a given subnet/CIDR ranges.

cidr cidr-ranges subnetting
1111
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

Feel free to connect with us on LinkedIn, Discord, or just write to us at [email protected].

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.