LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of hostapd-mana
Wireless Security
Visit Website

hostapd-mana

Details

Modified hostapd for advanced wifi attacks, enabling rogue access points and sophisticated wireless penetration testing scenarios.

Wireless
image of hostapd-wpe
Wireless Security
Visit Website

hostapd-wpe

Details

Modified hostapd to facilitate AP impersonation attacks, obtaining client credentials and enabling further attacks.

Wireless
image of httpx
ReconnaissanceApplication SecurityBug Bounty
Visit Website

httpx

Details

httpx is a fast and multi-purpose HTTP toolkit for reconnaissance, probing, and information gathering with retries and backoffs.

OSINTBug Bounty
image of iSH-tools
ReconnaissanceWireless Security
Visit Website

iSH-tools

Details

Ethical hacking toolkit for iOS devices using iSH Shell, providing various security and reconnaissance tools for mobile pen-testing.

MobileWireless
image of mimikatz
Exploit DevelopmentRed Team OperationsInfrastructure Security
Visit Website

mimikatz

Details

Mimikatz is a tool to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory on Windows systems.

InternalReport
image of mingw-w64
Reverse EngineeringExploit Development
Visit Website

mingw-w64

Details

A complete runtime environment for GCC & LLVM on Windows (x86, x64, ARM64), enabling native Windows application and library development.

Internal
image of mingw-woarm64-build
Exploit Development
Visit Website

mingw-woarm64-build

Details

Build scripts for aarch64-w64-mingw32 Windows on Arm64 GNU cross-compiler, enabling Windows binary creation on Linux hosts.

Internal
image of objection
Reverse EngineeringApplication SecurityExploit Development
Visit Website

objection

Details

objection is a runtime mobile exploration toolkit for assessing mobile app security posture without needing a jailbreak.

MobileStatic Analysis
image of powercat
Red Team OperationsInfrastructure Security
Visit Website

powercat

Details

Powercat: PowerShell version of Netcat, enabling network connectivity and data transfer with various protocols and payload generation.

C2Internal
image of pwndbg
Reverse EngineeringExploit Development
Visit Website

pwndbg

Details

Pwndbg is a GDB/LLDB plugin for exploit development and reverse engineering, simplifying debugging with advanced features.

External
image of pypykatz
Red Team OperationsInfrastructure Security
Visit Website

pypykatz

Details

pypykatz is a pure Python Mimikatz implementation for extracting credentials and secrets from Windows systems and memory dumps.

InternalExternal
image of reNgine
Application SecurityReconnaissanceRed Team Operations
Visit Website

reNgine

Details

reNgine is an automated web reconnaissance framework streamlining the recon process for security professionals and bug bounty hunters.

Bug BountyWebReport
  • Previous
  • 1
  • 2
  • More pages
  • 25
  • 26
  • 27
  • Next