LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of DragonOS
Wireless Security
Visit Website

DragonOS

Details

DragonOS is an out-of-the-box operating system tailored for software-defined radios (SDRs), available for Raspberry Pi and x86-64 architectures.

Wireless
image of Dryrun Security
Application Security
Visit Website

Dryrun Security

Details

AI-powered security agents that detect logic flaws, authorization gaps, and IDOR, preventing code risks in modern applications.

Static Analysis
image of EAPHammer
Wireless SecurityRed Team Operations
Visit Website

EAPHammer

Details

EAPHammer: Evil twin attacks against WPA2-Enterprise networks with hostile portal attacks and indirect wireless pivots.

Wireless
image of EAP_buster
Wireless Security
Visit Website

EAP_buster

Details

EAP_buster lists supported EAP methods of a RADIUS server, aiding red teams and detecting rogue WPA-Enterprise access points.

Wireless
image of EC-Council
TrainingCertifications
Visit Website

EC-Council

Details

EC-Council offers cybersecurity courses online, providing industry-recognized certifications and training for career advancement.

TrainingCertificationsWebInternalServices+1
image of Empire
Red Team Operations
Visit Website

Empire

Details

Empire is a post-exploitation framework for red teams and penetration testers, featuring encrypted comms and a modular design.

InternalExternalC2
image of EnforsterAI
AI SecurityApplication SecurityAPI SecurityCloud SecurityVulnerability Intelligence
Visit Website

EnforsterAI

Details

AI-native SAST tool for code security, detecting vulnerabilities, secrets, IaC issues, and AI model security with actionable AI fixes.

AIStatic AnalysisAPICloudWeb+1
image of Evil QR
Social EngineeringRed Team Operations
Visit Website

Evil QR

Details

Evil QR is a toolkit demonstrating how attackers can take over accounts by convincing users to scan supplied QR codes through phishing.

Phishing
image of Evil-WinRM
Infrastructure Security
Visit Website

Evil-WinRM

Details

Evil-WinRM is the ultimate WinRM shell for hacking/pentesting, offering features like in-memory script loading and AMSI bypass.

Internal
image of EvilCrowRF-V2
Wireless SecurityRed Team OperationsPhysical Security
Visit Website

EvilCrowRF-V2

Details

Evil Crow RF V2: A radio frequency hacking device for pentesting and red team ops, operating across multiple bands with dual CC1101 modules.

WirelessPhysicalBruteforce
image of EvilWAF
Application Security
Visit Website

EvilWAF

Details

EvilWAF is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).

Web
image of Evilginx Mastery
Social EngineeringTraining
Visit Website

Evilginx Mastery

Details

Master advanced phishing techniques with Evilginx, bypass MFA, and learn to create custom phishlets for red team engagements.

TrainingPhishing
  • Previous
  • 1
  • More pages
  • 7
  • 8
  • 9
  • More pages
  • 29
  • Next