LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Kali Linux
Infrastructure SecurityReverse EngineeringExploit DevelopmentWireless SecurityRed Team Operations
Visit Website

Kali Linux

Details

Kali Linux is a Debian-based distribution for penetration testing, ethical hacking, and network security assessments, offering a vast array of tools.

WirelessMobileExternalInternal
image of Kiterunner
API SecurityReconnaissance
Visit Website

Kiterunner

Details

Kiterunner is a contextual content discovery tool for modern web applications and APIs, excelling in route/endpoint bruteforcing.

APIBruteforceWeb
image of KnowBe4 HRM+
TrainingSocial Engineering
Visit Website

KnowBe4 HRM+

Details

KnowBe4 HRM+ is a human risk management platform with security awareness training, cloud email protection, and AI-driven defense agents.

TrainingServicesPhishing
image of Known Exploited Vulnerabilities
Vulnerability Intelligence
Visit Website

Known Exploited Vulnerabilities

Details

CISA's Known Exploited Vulnerabilities (KEV) Catalog is an authoritative resource listing vulnerabilities actively exploited in the wild, aiding organizations in prioritizing remediation efforts.

Vulnerability Intelligence
image of Ligolo-ng
Red Team OperationsInfrastructure Security
Visit Website

Ligolo-ng

Details

Ligolo-ng: Advanced tunneling tool using TUN interfaces for pentesters, enabling network access without SOCKS proxies.

Internal
image of LinPEAS
Infrastructure SecurityRed Team Operations
Visit Website

LinPEAS

Details

LinPEAS is a Linux privilege escalation auditing tool that automates checks for potential misconfigurations and vulnerabilities.

Internal
image of MHDDoS
Infrastructure Security
Visit Website

MHDDoS

Details

MHDDoS: A powerful Python3 DDoS attack script with 56 methods for cyber attacks, designed for testing and research purposes.

DoS
image of MITRE ATLAS
AI Security
Visit Website

MITRE ATLAS

Details

MITRE ATLAS is a knowledge base of adversary tactics and techniques targeting AI systems, helping organizations secure AI deployments.

AI
image of Maigret OSINT bot
ReconnaissanceSocial EngineeringBug Bounty
Visit Website

Maigret OSINT bot

Details

Maigret OSINT bot is a Telegram bot that helps you find information about people by their usernames across various online platforms.

OSINT
image of Maldev Academy
Training
Visit Website

Maldev Academy

Details

Maldev Academy offers an in-depth, module-based training platform focused on modern Windows malware development and offensive phishing operations.

Training
image of Maltego
ReconnaissanceSocial Engineering
Visit Website

Maltego

Details

Maltego is an investigation platform that accelerates complex cyber investigations, used by security analysts and investigators worldwide.

External
image of Masscan
ReconnaissanceInfrastructure Security
Visit Website

Masscan

Details

Masscan is a TCP port scanner capable of scanning the entire Internet in under 5 minutes, transmitting 10 million packets per second.

External
  • Previous
  • 1
  • More pages
  • 10
  • 11
  • 12
  • More pages
  • 23
  • Next