LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Commix
Application Security
Visit Website

Commix

Details

Commix is an open-source penetration testing tool for detecting and exploiting command injection vulnerabilities in web applications.

Web
image of Corellium Virtual Hardware
Application Security
Visit Website

Corellium Virtual Hardware

Details

Corellium provides virtualized iOS, Android, and Arm devices for accelerated security testing, research, and DevSecOps.

MobileTrainingServicesStatic Analysis
image of Covert Instruments
Physical Security
Visit Website

Covert Instruments

Details

Covert Instruments offers best-in-class lock picks & entry tools for locksmiths, hobbyists, and security professionals to elevate skills.

Physical
image of CrackMapExec
Infrastructure Security
Visit Website

CrackMapExec

Details

CrackMapExec is a swiss army knife for pentesting Windows networks, automating common tasks for assessing security vulnerabilities.

Internal
image of CrackMy.App
Reverse Engineering
Visit Website

CrackMy.App

Details

CrackMy.App: Share crackmes, solve reverse engineering challenges, and compete on the leaderboard in this ultimate community.

Training
image of Crackmes.one
Reverse Engineering
Visit Website

Crackmes.one

Details

Crackmes.one offers a vast collection of reverse engineering challenges to help hone your binary exploitation and reverse engineering skills.

Training
image of Cutter
Reverse EngineeringExploit Development
Visit Website

Cutter

Details

Cutter is a free and open-source reverse engineering platform powered by Rizin, designed for user-friendly and advanced analysis.

Static Analysis
image of CyberChef
Reverse EngineeringApplication Security
Visit Website

CyberChef

Details

CyberChef is a web app for encryption, encoding, compression, and data analysis, offering a wide range of operations in a drag-and-drop interface.

WebMobileBug Bounty
image of DNSDumpster
Reconnaissance
Visit Website

DNSDumpster

Details

DNSDumpster is a free domain research tool for discovering hosts, DNS records, and attack surfaces related to a domain.

External
Screenshot of DSViper
Exploit DevelopmentRed Team Operations
Visit Website

DSViper

Details

DSViper is a tool to bypass Windows Defender, enabling payload execution without triggering security alerts for ethical use.

Internal
image of Dalfox
Application SecurityAPI Security
Visit Website

Dalfox

Details

Dalfox is a powerful open-source XSS scanner and utility focused on automation, designed for detecting and verifying XSS vulnerabilities.

WebBug BountyStatic AnalysisAPI
image of DeHashed
Reconnaissance
Visit Website

DeHashed

Details

DeHashed is a powerful search engine for compromised credentials and breach data used in threat intelligence and reconnaissance.

External
  • Previous
  • 1
  • More pages
  • 6
  • 7
  • 8
  • More pages
  • 31
  • Next