LogoHackDB
  • Recent
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
🎉Follow HackDB onX (Twitter)

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
381+

381+ listings on HackDB

image of subwiz
ReconnaissanceBug Bounty
Visit Website

subwiz

Details

A lightweight GPT model trained to discover subdomains, aiding in reconnaissance and bug bounty hunting.

Bug BountyOSINTWeb
image of theHarvester
ReconnaissanceBug Bounty
Visit Website

theHarvester

Details

theHarvester is an OSINT tool for gathering emails, subdomains, IPs, and URLs to determine a domain's external threat landscape.

OSINT
image of urless
Bug BountyReconnaissance
Visit Website

urless

Details

A tool to de-clutter lists of URLs by removing redundant parameters, extensions, and unwanted content, enhancing reconnaissance.

Bug BountyOSINT
image of waymore
Bug BountyReconnaissance
Visit Website

waymore

Details

Finds more links from Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X, and downloads archived responses.

Bug BountyOSINT
image of winPEAS
Infrastructure Security
Visit Website

winPEAS

Details

PEASS-ng/winPEAS is a suite of scripts designed to identify potential privilege escalation paths on Windows systems.

Internal
image of xnLinkFinder
Application SecurityReconnaissance
Visit Website

xnLinkFinder

Details

A python tool to discover endpoints, potential parameters, and target-specific wordlists by crawling or analyzing various input sources.

WebBug Bounty
image of xnldorker
ReconnaissanceBug Bounty
Visit Website

xnldorker

Details

A command-line tool to gather dork results from various search engines, aiding in reconnaissance and vulnerability discovery.

Bug BountyOSINT
image of yetAnotherObfuscator
Exploit Development
Visit Website

yetAnotherObfuscator

Details

C# obfuscator designed to bypass Windows Defender, offering a practical solution for protecting .NET applications.

Internal
image of zphisher
Social Engineering
Visit Website

zphisher

Details

Automated phishing tool with 30+ templates for educational purposes, offering multiple tunneling options and URL masking.

Phishing
  • Previous
  • 1
  • 2
  • More pages
  • 30
  • 31
  • 32
  • Next

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security