LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Prowler
Cloud Security
Visit Website

Prowler

Details

Prowler is an open-source cloud security tool empowering cloud engineers with customizable security checks across AWS, Azure, GCP, and Kubernetes.

Cloud
image of Proxmark
Wireless SecurityPhysical SecurityRed Team Operations
Visit Website

Proxmark

Details

Proxmark is a versatile RFID tool for cloning Mifare and HID tags, ideal for penetration testing, research, and development in RFID security.

WirelessPhysical
image of ProxyChains
Infrastructure Security
Visit Website

ProxyChains

Details

ProxyChains is a tool to force TCP connections through proxies like TOR, supporting SOCKS4/5 and HTTP(S) with user/pass and basic auth.

Internal
image of PsExec
Infrastructure SecurityRed Team Operations
Visit Website

PsExec

Details

PsExec lets you execute processes on remote systems, complete with full interactivity for console applications, without client software installation.

InternalExternal
image of Pupy
Exploit DevelopmentRed Team OperationsInfrastructure Security
Visit Website

Pupy

Details

Pupy is a cross-platform post-exploitation framework and RAT, enabling in-memory execution and low-footprint operations across multiple OS.

C2
image of PwnDoc
Reporting
Visit Website

PwnDoc

Details

PwnDoc is a pentest reporting application that simplifies writing findings and generating customizable Docx reports, saving time on documentation.

Report
image of Pwned Labs
TrainingCloud Security
Visit Website

Pwned Labs

Details

Pwned Labs offers interactive, real-world cloud security labs for cybersecurity professionals to upskill affordably and effectively.

TrainingCloudCertifications
image of Pwntools
Reverse EngineeringExploit DevelopmentRed Team Operations
Visit Website

Pwntools

Details

Pwntools is a CTF framework and exploit development library written in Python, designed for rapid prototyping and exploit creation.

External
image of PyRIT
AI Security
Visit Website

PyRIT

Details

PyRIT is an open-source Python framework empowering security pros to proactively identify risks in generative AI systems.

AI
image of Qualys SSL Labs
Application Security
Visit Website

Qualys SSL Labs

Details

Qualys SSL Labs provides a free online service to perform deep analysis of the configuration of any SSL web server on the public Internet.

Web
image of RESTler
API SecurityCloud Security
Visit Website

RESTler

Details

RESTler is a stateful REST API fuzzing tool for automatically testing cloud services and finding security and reliability bugs.

APIBug Bounty
image of ROADtools
Cloud SecurityInfrastructure SecurityReconnaissance
Visit Website

ROADtools

Details

ROADtools is a framework for Azure AD security, offering tools for offensive and defensive purposes, including ROADrecon and roadtx.

InternalExternalCloud
  • Previous
  • 1
  • More pages
  • 18
  • 19
  • 20
  • More pages
  • 27
  • Next