LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of graphw00f
API Security
Visit Website

graphw00f

Details

GraphQL Server Engine Fingerprinting utility for software security professionals.

API
image of hashcat
Infrastructure Security
Visit Website

hashcat

Details

World's fastest password recovery utility, supporting CPUs, GPUs, and hardware accelerators on Linux, Windows, and macOS.

WirelessInternalExternalBruteforce
image of httpx
ReconnaissanceApplication SecurityBug Bounty
Visit Website

httpx

Details

httpx is a fast and multi-purpose HTTP toolkit for reconnaissance, probing, and information gathering with retries and backoffs.

OSINTBug Bounty
image of mimikatz
Exploit DevelopmentRed Team OperationsInfrastructure Security
Visit Website

mimikatz

Details

Mimikatz is a tool to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory on Windows systems.

InternalReport
image of mingw-w64
Reverse EngineeringExploit Development
Visit Website

mingw-w64

Details

A complete runtime environment for GCC & LLVM on Windows (x86, x64, ARM64), enabling native Windows application and library development.

Internal
image of mingw-woarm64-build
Exploit Development
Visit Website

mingw-woarm64-build

Details

Build scripts for aarch64-w64-mingw32 Windows on Arm64 GNU cross-compiler, enabling Windows binary creation on Linux hosts.

Internal
image of objection
Reverse EngineeringApplication SecurityExploit Development
Visit Website

objection

Details

objection is a runtime mobile exploration toolkit for assessing mobile app security posture without needing a jailbreak.

MobileStatic Analysis
image of powercat
Red Team OperationsInfrastructure Security
Visit Website

powercat

Details

Powercat: PowerShell version of Netcat, enabling network connectivity and data transfer with various protocols and payload generation.

C2Internal
image of pwndbg
Reverse EngineeringExploit Development
Visit Website

pwndbg

Details

Pwndbg is a GDB/LLDB plugin for exploit development and reverse engineering, simplifying debugging with advanced features.

External
image of pypykatz
Red Team OperationsInfrastructure Security
Visit Website

pypykatz

Details

pypykatz is a pure Python Mimikatz implementation for extracting credentials and secrets from Windows systems and memory dumps.

InternalExternal
image of reNgine
Application SecurityReconnaissanceRed Team Operations
Visit Website

reNgine

Details

reNgine is an automated web reconnaissance framework streamlining the recon process for security professionals and bug bounty hunters.

Bug BountyWebReport
image of reconFTW
ReconnaissanceApplication SecurityBug Bounty
Visit Website

reconFTW

Details

reconFTW automates reconnaissance, subdomain enumeration, and vulnerability checks, providing comprehensive target information.

Bug BountyWebOSINT
  • Previous
  • 1
  • 2
  • More pages
  • 20
  • 21
  • 22
  • Next