LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Wifite2
Wireless Security
Visit Website

Wifite2

Details

Wifite2 is a Python script for auditing wireless networks, automating various attacks to retrieve network passwords.

Wireless
image of WuppieFuzz
API Security
Visit Website

WuppieFuzz

Details

WuppieFuzz: coverage-guided REST API fuzzer using LibAFL, easy-to-use, explainable flaws, modular, supports black/grey/white box testing.

API
image of XSStrike
Application Security
Visit Website

XSStrike

Details

XSStrike is an advanced XSS detection suite with intelligent payload generation, fuzzing engine, and fast crawler for web security.

WebBug Bounty
image of Zero Day Initiative
Vulnerability Intelligence
Visit Website

Zero Day Initiative

Details

Zero Day Initiative publishes advisories on vulnerabilities discovered by their researchers, providing details and links to vendor fixes.

Vulnerability Intelligence
Screenshot of ZigStrike
Exploit DevelopmentRed Team Operations
Visit Website

ZigStrike

Details

ZigStrike is a shellcode loader with injection techniques and anti-sandbox features, using compile-time capabilities for shellcode allocation.

Internal
image of ZoomEye
Reconnaissance
Visit Website

ZoomEye

Details

ZoomEye is a cyberspace search engine for discovering and analyzing internet-connected devices, offering tools for asset discovery and vulnerability analysis.

External
image of angr
Reverse EngineeringExploit Development
Visit Website

angr

Details

angr is a platform-agnostic binary analysis framework for reverse engineering and vulnerability research.

Static Analysis
image of bettercap
Wireless Security
Visit Website

bettercap

Details

bettercap is a powerful, modular framework for network reconnaissance and MITM attacks over WiFi, Bluetooth LE, and Ethernet networks.

Wireless
image of crAPI
API Security
Visit Website

crAPI

Details

crAPI is a completely ridiculous API vulnerable by design, built on a microservices architecture, designed to help understand API security risks.

APITraining
image of crt.sh
Reconnaissance
Visit Website

crt.sh

Details

crt.sh is a Certificate Transparency (CT) log search tool that allows users to find SSL/TLS certificates issued for specific domains or organizations.

OSINT
image of disclose.io
Bug BountyReporting
Visit Website

disclose.io

Details

Open-source tools and resources for vulnerability disclosure, promoting safe harbor and standardized practices for hackers and organizations.

Bug BountyReport
image of donut
Reverse EngineeringExploit Development
Visit Website

donut

Details

Donut generates position-independent shellcode to load .NET Assemblies, PE files, VBScript, and other Windows payloads from memory.

Internal
  • Previous
  • 1
  • 2
  • More pages
  • 20
  • 21
  • 22
  • Next