LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
image of ICopyX
Physical SecurityRed Team Operations
Visit Website

ICopyX

Details

The iCopy-X is a portable RFID cloning tool for pentesters, security researchers, locksmiths, and hobbyists, simplifying RFID tag duplication.

WirelessPhysical
image of IDA Pro
Reverse EngineeringExploit Development
Visit Website

IDA Pro

Details

IDA Pro: The ultimate multi-platform, multi-processor reverse engineering and malware analysis tool with a powerful disassembler and debugger.

Static Analysis
image of Impacket
Infrastructure Security
Visit Website

Impacket

Details

Impacket is a collection of Python classes for working with network protocols, focused on low-level packet access and protocol implementation.

Internal
image of Impacket
Infrastructure Security
Visit Website

Impacket

Details

Impacket is a collection of Python classes for working with network protocols, providing low-level access to packets and protocol implementation.

Internal
image of InQL
API Security
Visit Website

InQL

Details

InQL is a Burp Suite extension for advanced GraphQL testing, offering vulnerability detection and customizable scans.

API
image of Intelligence X
Reconnaissance
Visit Website

Intelligence X

Details

Intelligence X is a search engine and data archive for searching Tor, I2P, data leaks, and the public web by email, domain, IP, and more.

WebExternal
image of Interact.sh
Application Security
Visit Website

Interactsh

Details

Interactsh is a tool and service for capturing and handling out-of-band interactions during security testing.

InternalWebAPI
image of Intigriti
Bug Bounty
Visit Website

Intigriti

Details

Intigriti: crowdsourced security platform offering bug bounty, VDP, and pentesting services, connecting businesses with ethical hackers.

Bug Bounty
image of JWT Debugger
Application SecurityAPI Security
Visit Website

JWT Debugger

Details

JWT Debugger is a web application to create, encode, decode, and debug JWT (JSON Web Tokens).

WebAPIStatic Analysis
image of John the Ripper jumbo
Infrastructure Security
Visit Website

John the Ripper jumbo

Details

John the Ripper jumbo is an advanced password cracker supporting hundreds of hash types and running on various platforms.

WirelessWebInternalExternalBruteforce
image of Kali Linux
Infrastructure SecurityReverse EngineeringExploit DevelopmentWireless SecurityRed Team Operations
Visit Website

Kali Linux

Details

Kali Linux is a Debian-based distribution for penetration testing, ethical hacking, and network security assessments, offering a vast array of tools.

WirelessMobileExternalInternal
image of Kerbrute
Infrastructure Security
Visit Website

Kerbrute

Details

Kerbrute is a tool for bruteforcing and enumerating valid Active Directory accounts via Kerberos pre-authentication.

Internal
  • Previous
  • 1
  • More pages
  • 11
  • 12
  • 13
  • More pages
  • 27
  • Next