LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Evil QR
Social EngineeringRed Team Operations
Visit Website

Evil QR

Details

Evil QR is a toolkit demonstrating how attackers can take over accounts by convincing users to scan supplied QR codes through phishing.

Phishing
image of Evil-WinRM
Infrastructure Security
Visit Website

Evil-WinRM

Details

Evil-WinRM is the ultimate WinRM shell for hacking/pentesting, offering features like in-memory script loading and AMSI bypass.

Internal
image of EvilCrowRF-V2
Wireless SecurityRed Team OperationsPhysical Security
Visit Website

EvilCrowRF-V2

Details

Evil Crow RF V2: A radio frequency hacking device for pentesting and red team ops, operating across multiple bands with dual CC1101 modules.

WirelessPhysicalBruteforce
image of Evilginx Mastery
Social EngineeringTraining
Visit Website

Evilginx Mastery

Details

Master advanced phishing techniques with Evilginx, bypass MFA, and learn to create custom phishlets for red team engagements.

TrainingPhishing
image of Exploit Database
Vulnerability Intelligence
Visit Website

Exploit Database

Details

Exploit Database (Exploit-DB) is a curated repository of public exploits and proof-of-concepts for offensive and defensive security professionals.

Vulnerability Intelligence
image of Exploit.IN
Vulnerability Intelligence
Visit Website

Exploit.IN

Details

Exploit.IN delivers the latest news, research, and tools concerning hacking, exploits, vulnerabilities, malware, and cybersecurity laws.

Vulnerability Intelligence
image of FOFA Search Engine
Reconnaissance
Visit Website

FOFA Search Engine

Details

FOFA is a cyberspace search engine that helps researchers and enterprises quickly match network assets through cyberspace mapping.

External
image of Faction Security
Application SecurityReporting
Visit Website

Faction Security

Details

Automate PenTest reporting and AppSec Posture Management (ASPM) for penetration testers, red teams, and application security teams.

Report
image of Faraday Security
Reporting
Visit Website

Faraday Security

Details

Faraday Security: Cybersecurity tools to optimize network security, reinforce defenses, and protect against attackers with agile vulnerability management.

Report
image of Feroxbuster
ReconnaissanceApplication Security
Visit Website

Feroxbuster

Details

Feroxbuster is a fast, simple, recursive content discovery tool written in Rust, designed for forced browsing.

WebBug Bounty
image of Flipper Zero
Wireless SecurityPhysical Security
Visit Website

Flipper Zero

Details

Flipper Zero is a portable multi-tool for pentesters and geeks, designed for exploring access control systems, radio protocols, and hardware.

WirelessPhysical
image of Frida
Reverse EngineeringApplication SecurityExploit Development
Visit Website

Frida

Details

Frida is a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers to analyze and modify application behavior.

Mobile
  • Previous
  • 1
  • More pages
  • 6
  • 7
  • 8
  • More pages
  • 22
  • Next