LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of EC-Council
TrainingCertifications
Visit Website

EC-Council

Details

EC-Council offers cybersecurity courses online, providing industry-recognized certifications and training for career advancement.

TrainingCertificationsWebInternalServices+1
image of Empire
Red Team Operations
Visit Website

Empire

Details

Empire is a post-exploitation framework for red teams and penetration testers, featuring encrypted comms and a modular design.

InternalExternalC2
image of EnforsterAI
AI SecurityApplication SecurityAPI SecurityCloud SecurityVulnerability Intelligence
Visit Website

EnforsterAI

Details

AI-native SAST tool for code security, detecting vulnerabilities, secrets, IaC issues, and AI model security with actionable AI fixes.

AIStatic AnalysisAPICloudWeb+1
image of Evil QR
Social EngineeringRed Team Operations
Visit Website

Evil QR

Details

Evil QR is a toolkit demonstrating how attackers can take over accounts by convincing users to scan supplied QR codes through phishing.

Phishing
image of Evil-WinRM
Infrastructure Security
Visit Website

Evil-WinRM

Details

Evil-WinRM is the ultimate WinRM shell for hacking/pentesting, offering features like in-memory script loading and AMSI bypass.

Internal
image of EvilCrowRF-V2
Wireless SecurityRed Team OperationsPhysical Security
Visit Website

EvilCrowRF-V2

Details

Evil Crow RF V2: A radio frequency hacking device for pentesting and red team ops, operating across multiple bands with dual CC1101 modules.

WirelessPhysicalBruteforce
image of EvilWAF
Application Security
Visit Website

EvilWAF

Details

EvilWAF is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).

Web
image of Evilginx Mastery
Social EngineeringTraining
Visit Website

Evilginx Mastery

Details

Master advanced phishing techniques with Evilginx, bypass MFA, and learn to create custom phishlets for red team engagements.

TrainingPhishing
image of Exploit Database
Vulnerability Intelligence
Visit Website

Exploit Database

Details

Exploit Database (Exploit-DB) is a curated repository of public exploits and proof-of-concepts for offensive and defensive security professionals.

Vulnerability Intelligence
image of Exploit.IN
Vulnerability Intelligence
Visit Website

Exploit.IN

Details

Exploit.IN delivers the latest news, research, and tools concerning hacking, exploits, vulnerabilities, malware, and cybersecurity laws.

Vulnerability Intelligence
image of FOFA Search Engine
Reconnaissance
Visit Website

FOFA Search Engine

Details

FOFA is a cyberspace search engine that helps researchers and enterprises quickly match network assets through cyberspace mapping.

External
image of Faction Security
Application SecurityReporting
Visit Website

Faction Security

Details

Automate PenTest reporting and AppSec Posture Management (ASPM) for penetration testers, red teams, and application security teams.

Report
  • Previous
  • 1
  • More pages
  • 7
  • 8
  • 9
  • More pages
  • 27
  • Next