LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of ProjectDiscovery
ReconnaissanceApplication SecurityBug Bounty
Visit Website

ProjectDiscovery

Details

ProjectDiscovery offers real-time vulnerability detection, asset discovery, and customizable exploit detection for streamlined security workflows.

OSINTBug Bounty
image of Prompt Airlines AI CTF
AI Security
Visit Website

Prompt Airlines AI CTF

Details

Prompt Airlines AI CTF by Wiz challenges users to manipulate an AI chatbot for a free ticket, focusing on AI security vulnerabilities.

AITraining
image of Prompt Injection Payloads
AI Security
Visit Website

Prompt Injection Payloads

Details

Payloads and techniques for exploiting prompt injection vulnerabilities in AI/NLP models like ChatGPT, including direct and indirect methods.

AI
image of PromptBench
AI Security
Visit Website

PromptBench

Details

PromptBench: A unified library for evaluating and understanding large language models, enabling quick model assessment and robustness testing.

AI
image of Prowler
Cloud Security
Visit Website

Prowler

Details

Prowler is an open-source cloud security tool empowering cloud engineers with customizable security checks across AWS, Azure, GCP, and Kubernetes.

Cloud
image of Proxmark
Wireless SecurityPhysical SecurityRed Team Operations
Visit Website

Proxmark

Details

Proxmark is a versatile RFID tool for cloning Mifare and HID tags, ideal for penetration testing, research, and development in RFID security.

WirelessPhysical
image of ProxyChains
Infrastructure Security
Visit Website

ProxyChains

Details

ProxyChains is a tool to force TCP connections through proxies like TOR, supporting SOCKS4/5 and HTTP(S) with user/pass and basic auth.

Internal
image of PsExec
Infrastructure SecurityRed Team Operations
Visit Website

PsExec

Details

PsExec lets you execute processes on remote systems, complete with full interactivity for console applications, without client software installation.

InternalExternal
image of Pupy
Exploit DevelopmentRed Team OperationsInfrastructure Security
Visit Website

Pupy

Details

Pupy is a cross-platform post-exploitation framework and RAT, enabling in-memory execution and low-footprint operations across multiple OS.

C2
image of PwnDoc
Reporting
Visit Website

PwnDoc

Details

PwnDoc is a pentest reporting application that simplifies writing findings and generating customizable Docx reports, saving time on documentation.

Report
image of Pwntools
Reverse EngineeringExploit DevelopmentRed Team Operations
Visit Website

Pwntools

Details

Pwntools is a CTF framework and exploit development library written in Python, designed for rapid prototyping and exploit creation.

External
image of PyRIT
AI Security
Visit Website

PyRIT

Details

PyRIT is an open-source Python framework empowering security pros to proactively identify risks in generative AI systems.

AI
  • Previous
  • 1
  • More pages
  • 15
  • 16
  • 17
  • More pages
  • 23
  • Next