LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Interact.sh
Application Security
Visit Website

Interactsh

Details

Interactsh is a tool and service for capturing and handling out-of-band interactions during security testing.

InternalWebAPI
image of Interlace
Bug BountyReconnaissance
Visit Website

Interlace

Details

A multi-threaded application to turn single-threaded command line applications into faster, more efficient tools with CIDR and glob support.

OSINTBug Bounty
image of Intigriti
Bug Bounty
Visit Website

Intigriti

Details

Intigriti: crowdsourced security platform offering bug bounty, VDP, and pentesting services, connecting businesses with ethical hackers.

Bug Bounty
image of JWT Debugger
Application SecurityAPI Security
Visit Website

JWT Debugger

Details

JWT Debugger is a web application to create, encode, decode, and debug JWT (JSON Web Tokens).

WebAPIStatic Analysis
image of John the Ripper jumbo
Infrastructure Security
Visit Website

John the Ripper jumbo

Details

John the Ripper jumbo is an advanced password cracker supporting hundreds of hash types and running on various platforms.

WirelessWebInternalExternalBruteforce
image of Kali Linux
Infrastructure SecurityReverse EngineeringExploit DevelopmentWireless SecurityRed Team Operations
Visit Website

Kali Linux

Details

Kali Linux is a Debian-based distribution for penetration testing, ethical hacking, and network security assessments, offering a vast array of tools.

WirelessMobileExternalInternal
image of Kerbrute
Infrastructure Security
Visit Website

Kerbrute

Details

Kerbrute is a tool for bruteforcing and enumerating valid Active Directory accounts via Kerberos pre-authentication.

Internal
image of Kiterunner
API SecurityReconnaissance
Visit Website

Kiterunner

Details

Kiterunner is a contextual content discovery tool for modern web applications and APIs, excelling in route/endpoint bruteforcing.

APIBruteforceWeb
image of KnowBe4 HRM+
TrainingSocial Engineering
Visit Website

KnowBe4 HRM+

Details

KnowBe4 HRM+ is a human risk management platform with security awareness training, cloud email protection, and AI-driven defense agents.

TrainingServicesPhishing
image of Known Exploited Vulnerabilities
Vulnerability Intelligence
Visit Website

Known Exploited Vulnerabilities

Details

CISA's Known Exploited Vulnerabilities (KEV) Catalog is an authoritative resource listing vulnerabilities actively exploited in the wild, aiding organizations in prioritizing remediation efforts.

Vulnerability Intelligence
image of LaZagne
Infrastructure SecurityReconnaissance
Visit Website

LaZagne

Details

LaZagne is an open-source password recovery tool designed to retrieve stored passwords from a local computer using various techniques.

Internal
image of Lakera
AI Security
Visit Website

Lakera

Details

Lakera provides an AI-native security platform to accelerate GenAI initiatives, trusted by Fortune 500s and backed by AI red teams.

AI
  • Previous
  • 1
  • More pages
  • 12
  • 13
  • 14
  • More pages
  • 29
  • Next