LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Responder
Infrastructure SecurityReconnaissance
Visit Website

Responder

Details

Responder is a LLMNR, NBT-NS and MDNS poisoner with built-in rogue authentication servers for capturing credentials and performing relay attacks.

Internal
image of Retire.js
Application Security
Visit Website

Retire.js

Details

Retire.js: Scans web/Node.js apps for vulnerable JS libraries & generates SBOMs, aiding in identifying & mitigating security risks.

WebStatic Analysis
image of RustScan
ReconnaissanceInfrastructure Security
Visit Website

RustScan

Details

RustScan: lightning-fast port scanner automating Nmap integration with adaptive learning for efficient network reconnaissance and security audits.

External
image of S3Scanner
Cloud SecurityReconnaissanceInfrastructure Security
Visit Website

S3Scanner

Details

S3Scanner finds misconfigured S3 buckets across various cloud providers, enhancing cloud security posture and data leak prevention.

Bug BountyWebCloud
image of SPARROWS Lock Picks
Physical Security
Visit Website

SPARROWS Lock Picks

Details

Sparrows Lock Picks offers quality lock picks, covert entry tools, beginner sets, practice locks, and tutorials for lock picking success.

Physical
image of ScoutSuite
Cloud Security
Visit Website

ScoutSuite

Details

ScoutSuite: Multi-cloud security auditing tool for AWS, Azure, and GCP. Gathers configuration data and highlights risk areas.

Cloud
image of SecLists
Application SecurityCloud SecurityInfrastructure SecurityRed Team Operations
Visit Website

SecLists

Details

SecLists is a collection of multiple types of lists used during security assessments, collected in one place for easy access.

Bug BountyWebExternalInternal
image of SecurityTrails
Bug BountyReconnaissance
Visit Website

SecurityTrails

Details

SecurityTrails is a threat intelligence platform that provides comprehensive data on internet assets, aiding organizations in monitoring and securing their digital footprint.​

Bug BountyOSINT
image of Seek Thermal
Physical Security
Visit Website

Seek Thermal

Details

Seek Thermal offers thermal imaging tools ideal for physical pentesters and red teamers to assess building security and detect hidden activity.

Physical
image of Sherlock
ReconnaissanceSocial EngineeringBug Bounty
Visit Website

Sherlock

Details

Sherlock is an OSINT tool for finding usernames across social networks to support digital investigations and reconnaissance.

Bug BountyOSINT
image of Shodan
Reconnaissance
Visit Website

Shodan

Details

Shodan is a search engine for Internet-connected devices, enabling users to discover and monitor exposed services and gain Internet intelligence.

APIWebExternal
image of SigmaPotato
Infrastructure Security
Visit Website

SigmaPotato

Details

SigmaPotato: SeImpersonate privilege escalation tool for Windows 8-11 & Server 2012-2022 with PowerShell & .NET reflection support.

Internal
  • Previous
  • 1
  • More pages
  • 16
  • 17
  • 18
  • More pages
  • 23
  • Next