LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of DNSDumpster
Reconnaissance
Visit Website

DNSDumpster

Details

DNSDumpster is a free domain research tool for discovering hosts, DNS records, and attack surfaces related to a domain.

External
Screenshot of DSViper
Exploit DevelopmentRed Team Operations
Visit Website

DSViper

Details

DSViper is a tool to bypass Windows Defender, enabling payload execution without triggering security alerts for ethical use.

Internal
image of Dalfox
Application SecurityAPI Security
Visit Website

Dalfox

Details

Dalfox is a powerful open-source XSS scanner and utility focused on automation, designed for detecting and verifying XSS vulnerabilities.

WebBug BountyStatic AnalysisAPI
image of DeHashed
Reconnaissance
Visit Website

DeHashed

Details

DeHashed is a powerful search engine for compromised credentials and breach data used in threat intelligence and reconnaissance.

External
image of DefectDojo
Reporting
Visit Website

DefectDojo

Details

DefectDojo automates application security vulnerability management, unifying security tools and streamlining DevSecOps workflows.

Report
image of Dradis Community Edition
Reporting
Visit Website

Dradis Community Edition

Details

Dradis CE is an open-source reporting and collaboration tool for InfoSec professionals to streamline security project reporting for free.

Report
image of Dradis Pro
Reporting
Visit Website

Dradis Pro

Details

Dradis Pro streamlines pentesting with collaboration, automation, and consistent reporting, trusted by security teams worldwide.

ReportWebInternalServicesExternal
image of DragonOS
Wireless Security
Visit Website

DragonOS

Details

DragonOS is an out-of-the-box operating system tailored for software-defined radios (SDRs), available for Raspberry Pi and x86-64 architectures.

Wireless
image of EC-Council
TrainingCertifications
Visit Website

EC-Council

Details

EC-Council offers cybersecurity courses online, providing industry-recognized certifications and training for career advancement.

TrainingCertificationsWebInternalServices+1
image of Empire
Red Team Operations
Visit Website

Empire

Details

Empire is a post-exploitation framework for red teams and penetration testers, featuring encrypted comms and a modular design.

InternalExternalC2
image of Evil QR
Social EngineeringRed Team Operations
Visit Website

Evil QR

Details

Evil QR is a toolkit demonstrating how attackers can take over accounts by convincing users to scan supplied QR codes through phishing.

Phishing
image of Evil-WinRM
Infrastructure Security
Visit Website

Evil-WinRM

Details

Evil-WinRM is the ultimate WinRM shell for hacking/pentesting, offering features like in-memory script loading and AMSI bypass.

Internal
  • Previous
  • 1
  • More pages
  • 5
  • 6
  • 7
  • More pages
  • 22
  • Next