LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of powercat
Red Team OperationsInfrastructure Security
Visit Website

powercat

Details

Powercat: PowerShell version of Netcat, enabling network connectivity and data transfer with various protocols and payload generation.

C2Internal
image of pretender
Infrastructure Security
Visit Website

pretender

Details

A MitM tool for relaying attacks, featuring DHCPv6 DNS takeover and local name resolution spoofing (mDNS, LLMNR, NetBIOS-NS).

Internal
image of pwndbg
Reverse EngineeringExploit Development
Visit Website

pwndbg

Details

Pwndbg is a GDB/LLDB plugin for exploit development and reverse engineering, simplifying debugging with advanced features.

External
image of pypykatz
Red Team OperationsInfrastructure Security
Visit Website

pypykatz

Details

pypykatz is a pure Python Mimikatz implementation for extracting credentials and secrets from Windows systems and memory dumps.

InternalExternal
image of reNgine
Application SecurityReconnaissanceRed Team Operations
Visit Website

reNgine

Details

reNgine is an automated web reconnaissance framework streamlining the recon process for security professionals and bug bounty hunters.

Bug BountyWebReport
image of reconFTW
ReconnaissanceApplication SecurityBug Bounty
Visit Website

reconFTW

Details

reconFTW automates reconnaissance, subdomain enumeration, and vulnerability checks, providing comprehensive target information.

Bug BountyWebOSINT
image of shcheck
Application Security
Visit Website

shcheck

Details

shcheck is a tool to check security headers of a website, reporting which are enabled and which are not.

Web
image of sqlmap
Application Security
Visit Website

sqlmap

Details

sqlmap is an automatic SQL injection and database takeover tool for penetration testing and vulnerability detection.

WebMobileAPIBug Bounty
image of subwiz
ReconnaissanceBug Bounty
Visit Website

subwiz

Details

A lightweight GPT model trained to discover subdomains, aiding in reconnaissance and bug bounty hunting.

Bug BountyOSINTWeb
image of theHarvester
ReconnaissanceBug Bounty
Visit Website

theHarvester

Details

theHarvester is an OSINT tool for gathering emails, subdomains, IPs, and URLs to determine a domain's external threat landscape.

OSINT
image of urless
Bug BountyReconnaissance
Visit Website

urless

Details

A tool to de-clutter lists of URLs by removing redundant parameters, extensions, and unwanted content, enhancing reconnaissance.

Bug BountyOSINT
image of waymore
Bug BountyReconnaissance
Visit Website

waymore

Details

Finds more links from Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X, and downloads archived responses.

Bug BountyOSINT
  • Previous
  • 1
  • 2
  • More pages
  • 28
  • 29
  • 30
  • Next