LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of mingw-w64
Reverse EngineeringExploit Development
Visit Website

mingw-w64

Details

A complete runtime environment for GCC & LLVM on Windows (x86, x64, ARM64), enabling native Windows application and library development.

Internal
image of mingw-woarm64-build
Exploit Development
Visit Website

mingw-woarm64-build

Details

Build scripts for aarch64-w64-mingw32 Windows on Arm64 GNU cross-compiler, enabling Windows binary creation on Linux hosts.

Internal
image of objection
Reverse EngineeringApplication SecurityExploit Development
Visit Website

objection

Details

objection is a runtime mobile exploration toolkit for assessing mobile app security posture without needing a jailbreak.

MobileStatic Analysis
image of powercat
Red Team OperationsInfrastructure Security
Visit Website

powercat

Details

Powercat: PowerShell version of Netcat, enabling network connectivity and data transfer with various protocols and payload generation.

C2Internal
image of pwndbg
Reverse EngineeringExploit Development
Visit Website

pwndbg

Details

Pwndbg is a GDB/LLDB plugin for exploit development and reverse engineering, simplifying debugging with advanced features.

External
image of pypykatz
Red Team OperationsInfrastructure Security
Visit Website

pypykatz

Details

pypykatz is a pure Python Mimikatz implementation for extracting credentials and secrets from Windows systems and memory dumps.

InternalExternal
image of reNgine
Application SecurityReconnaissanceRed Team Operations
Visit Website

reNgine

Details

reNgine is an automated web reconnaissance framework streamlining the recon process for security professionals and bug bounty hunters.

Bug BountyWebReport
image of reconFTW
ReconnaissanceApplication SecurityBug Bounty
Visit Website

reconFTW

Details

reconFTW automates reconnaissance, subdomain enumeration, and vulnerability checks, providing comprehensive target information.

Bug BountyWebOSINT
image of shcheck
Application Security
Visit Website

shcheck

Details

shcheck is a tool to check security headers of a website, reporting which are enabled and which are not.

Web
image of sqlmap
Application Security
Visit Website

sqlmap

Details

sqlmap is an automatic SQL injection and database takeover tool for penetration testing and vulnerability detection.

WebMobileAPIBug Bounty
image of theHarvester
ReconnaissanceBug Bounty
Visit Website

theHarvester

Details

theHarvester is an OSINT tool for gathering emails, subdomains, IPs, and URLs to determine a domain's external threat landscape.

OSINT
image of winPEAS
Infrastructure Security
Visit Website

winPEAS

Details

PEASS-ng/winPEAS is a suite of scripts designed to identify potential privilege escalation paths on Windows systems.

Internal
  • Previous
  • 1
  • 2
  • More pages
  • 24
  • 25
  • 26
  • Next