Less Googling, More Hacking!

297 InfoSec Tools in Our Directory

297 Tools in InfoSec Tools

CVE-2017-8759

CVE-2017-8759

by bhdresh

Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.

security tool
316
View Details
Verified
shad0w

shad0w

by bats3c

A post exploitation framework designed to operate covertly on heavily monitored environments

c c2 docker
2096
View Details
o365recon

o365recon

by nyxgeek

retrieve information via O365 and AzureAD with a valid cred

azure azuread hacking
719
View Details
RedTeaming_CheatSheet

RedTeaming_CheatSheet

by 0xJs

Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.

security tool
1406
View Details
Verified
osmedeus

osmedeus

by j3ssie

A Workflow Engine for Offensive Security

attack-surface attack-surface-management bug-bounty
5606
View Details
Gf-Patterns

Gf-Patterns

by 1ndianl33t

GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep

security tool
1315
View Details
Verified
snallygaster

snallygaster

by hannob

Tool to scan for secret files on HTTP servers

security tool
2089
View Details
ChopChop

ChopChop

by michelin

ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.

devsecops scanning security
691
View Details
Verified
ParamSpider

ParamSpider

by devanshbatham

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

bugbounty content-discovery fuzzing
2746
View Details
FridaMe

FridaMe

by CognisysGroup

FridaMe is intentionally vulnerable android application developed to demonstrate the usage of Frida.

security tool
8
View Details
smbcrawler

smbcrawler

by SySS-Research

smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares

pentest red-team-tools shares
166
View Details
Verified
Havoc

Havoc

by HavocFramework

The Havoc Framework

security tool
7572
View Details
Verified
sliver

sliver

by BishopFox

Adversary Emulation Framework

adversarial-attacks adversary-simulation c2
9425
View Details
DojoLoader

DojoLoader

by naksyn

Generic PE loader for fast prototyping evasion techniques

cobalt-strike edr-evasion evasion
231
View Details
Nimbo-C2

Nimbo-C2

by itaymigdal

Nimbo-C2 is yet another (simple and lightweight) C2 framework

c2 c2-framework command-and-control
400
View Details

Frequently Asked Questions about InfosecMania

Learn more about Cybersecurity Tools and how they can enhance your security posture

InfoSecMania is a comprehensive directory of cybersecurity tools and resources designed to help security professionals find the right tools for their needs.

You can submit a tool by clicking on the 'Submit Tool' link in the navigation menu and filling out the submission form with details about your tool.

No, InfoSecMania includes both free and commercial tools. Each tool listing indicates whether it's free, paid, or offers a freemium model.

Tools are categorized based on their primary function, such as penetration testing, vulnerability assessment, network security, etc. Many tools may appear in multiple categories if they serve multiple purposes.

We only list tools and resources from publicly available, reputable sources — most of which are open-source and widely used in the cybersecurity community. However, always review and test tools in a safe, legal environment, like your lab or VM.

We actively monitor public repositories, GitHub, and community forums to keep our tool listings fresh. Many tools are auto-sourced from open-source feeds and security communities.