LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of disclose.io
Bug BountyReporting
Visit Website

disclose.io

Details

Open-source tools and resources for vulnerability disclosure, promoting safe harbor and standardized practices for hackers and organizations.

Bug BountyReport
image of donut
Reverse EngineeringExploit Development
Visit Website

donut

Details

Donut generates position-independent shellcode to load .NET Assemblies, PE files, VBScript, and other Windows payloads from memory.

Internal
image of eCPPT Certification
CertificationsTraining
Visit Website

eCPPT Certification

Details

The eCPPT certification validates practical penetration testing skills, covering reconnaissance, web app testing, exploit development, and Active Directory.

CertificationsTraining
image of ffuf
Application SecurityReconnaissance
Visit Website

ffuf

Details

ffuf is a fast web fuzzer written in Go, designed for content discovery and web application security testing.

WebBug BountyExternal
image of garak
AI Security
Visit Website

garak

Details

Garak is an LLM vulnerability scanner that probes for weaknesses like prompt injection, data leakage, hallucination, and toxicity.

AI
image of graphw00f
API Security
Visit Website

graphw00f

Details

GraphQL Server Engine Fingerprinting utility for software security professionals.

API
image of hashcat
Infrastructure Security
Visit Website

hashcat

Details

World's fastest password recovery utility, supporting CPUs, GPUs, and hardware accelerators on Linux, Windows, and macOS.

WirelessInternalExternalBruteforce
image of httpx
ReconnaissanceApplication SecurityBug Bounty
Visit Website

httpx

Details

httpx is a fast and multi-purpose HTTP toolkit for reconnaissance, probing, and information gathering with retries and backoffs.

OSINTBug Bounty
image of mimikatz
Exploit DevelopmentRed Team OperationsInfrastructure Security
Visit Website

mimikatz

Details

Mimikatz is a tool to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory on Windows systems.

InternalReport
image of mingw-w64
Reverse EngineeringExploit Development
Visit Website

mingw-w64

Details

A complete runtime environment for GCC & LLVM on Windows (x86, x64, ARM64), enabling native Windows application and library development.

Internal
image of mingw-woarm64-build
Exploit Development
Visit Website

mingw-woarm64-build

Details

Build scripts for aarch64-w64-mingw32 Windows on Arm64 GNU cross-compiler, enabling Windows binary creation on Linux hosts.

Internal
image of objection
Reverse EngineeringApplication SecurityExploit Development
Visit Website

objection

Details

objection is a runtime mobile exploration toolkit for assessing mobile app security posture without needing a jailbreak.

MobileStatic Analysis
  • Previous
  • 1
  • 2
  • More pages
  • 21
  • 22
  • 23
  • Next