LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of dnstwist
Social EngineeringReconnaissance
Visit Website

dnstwist

Details

dnstwist is a phishing domain scanner that finds lookalike domains adversaries can use to attack you, helping to identify potential threats.

PhishingOSINT
image of donut
Reverse EngineeringExploit Development
Visit Website

donut

Details

Donut generates position-independent shellcode to load .NET Assemblies, PE files, VBScript, and other Windows payloads from memory.

Internal
image of eCPPT Certification
CertificationsTraining
Visit Website

eCPPT Certification

Details

The eCPPT certification validates practical penetration testing skills, covering reconnaissance, web app testing, exploit development, and Active Directory.

CertificationsTraining
image of ffuf
Application SecurityReconnaissance
Visit Website

ffuf

Details

ffuf is a fast web fuzzer written in Go, designed for content discovery and web application security testing.

WebBug BountyExternal
image of garak
AI Security
Visit Website

garak

Details

Garak is an LLM vulnerability scanner that probes for weaknesses like prompt injection, data leakage, hallucination, and toxicity.

AI
image of graphw00f
API Security
Visit Website

graphw00f

Details

GraphQL Server Engine Fingerprinting utility for software security professionals.

API
image of hashcat
Infrastructure Security
Visit Website

hashcat

Details

World's fastest password recovery utility, supporting CPUs, GPUs, and hardware accelerators on Linux, Windows, and macOS.

WirelessInternalExternalBruteforce
image of hostapd-mana
Wireless Security
Visit Website

hostapd-mana

Details

Modified hostapd for advanced wifi attacks, enabling rogue access points and sophisticated wireless penetration testing scenarios.

Wireless
image of hostapd-wpe
Wireless Security
Visit Website

hostapd-wpe

Details

Modified hostapd to facilitate AP impersonation attacks, obtaining client credentials and enabling further attacks.

Wireless
image of httpx
ReconnaissanceApplication SecurityBug Bounty
Visit Website

httpx

Details

httpx is a fast and multi-purpose HTTP toolkit for reconnaissance, probing, and information gathering with retries and backoffs.

OSINTBug Bounty
image of iSH-tools
ReconnaissanceWireless Security
Visit Website

iSH-tools

Details

Ethical hacking toolkit for iOS devices using iSH Shell, providing various security and reconnaissance tools for mobile pen-testing.

MobileWireless
image of mimikatz
Exploit DevelopmentRed Team OperationsInfrastructure Security
Visit Website

mimikatz

Details

Mimikatz is a tool to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory on Windows systems.

InternalReport
  • Previous
  • 1
  • 2
  • More pages
  • 24
  • 25
  • 26
  • Next