LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of GEF
Reverse EngineeringExploit Development
Visit Website

GEF

Details

GEF is a kick-ass set of commands for GDB to make it cool again for exploit dev and reverse engineering on X86, ARM, MIPS, PowerPC, and SPARC.

External
image of GIAC GPEN
CertificationsRed Team Operations
Visit Website

GIAC GPEN

Details

The GPEN certification validates a professional's ability to conduct penetration tests using best-practice techniques and methodologies.

CertificationsTraining
image of GIAC GWAPT
CertificationsTraining
Visit Website

GIAC GWAPT

Details

The GWAPT certification validates web application penetration testing skills, covering exploits, security issues, and testing methodologies.

CertificationsTraining
image of Gandalf
AI Security
Visit Website

Gandalf

Details

Gandalf is a prompting skills test by Lakera that challenges users to extract secret information from a large language model.

AI
image of Ghauri
Application Security
Visit Website

Ghauri

Details

Ghauri is a cross-platform tool for detecting and exploiting SQL injection flaws, automating the process for security professionals.

WebBug Bounty
image of Ghidra
Reverse EngineeringExploit Development
Visit Website

Ghidra

Details

Ghidra is a powerful open-source reverse engineering tool developed by the NSA, offering a suite of software analysis features including decompilation and disassembly.

Static Analysis
image of Ghostwriter
Reporting
Visit Website

Ghostwriter

Details

SpecterOps Ghostwriter is a project management and reporting platform designed for security professionals to manage clients, projects, and reports.

Report
image of Gitleaks
Application SecurityCloud Security
Visit Website

Gitleaks

Details

Gitleaks detects secrets like passwords, API keys, and tokens in git repositories, files, and standard input.

Static Analysis
image of Gobuster
Application SecurityReconnaissanceInfrastructure Security
Visit Website

Gobuster

Details

Gobuster is a tool to brute-force URIs, DNS subdomains, and virtual hostnames, aiding in web application reconnaissance.

WebExternalBug BountyClassification
image of Gophish
Social Engineering
Visit Website

Gophish

Details

Gophish is a powerful open-source phishing toolkit designed to help organizations and security professionals conduct realistic phishing simulations.

Phishing
image of GraphQL Cop
API Security
Visit Website

GraphQL Cop

Details

GraphQL Cop is a Python utility for running security tests against GraphQL APIs, ideal for CI/CD checks and vulnerability reproduction.

API
image of GraphQL Security
API Security
Visit Website

GraphQL Security

Details

Assess the security of your GraphQL apps: authorization, access control, complexity limits, introspection, DDOS, and injections.

API
  • Previous
  • 1
  • More pages
  • 7
  • 8
  • 9
  • More pages
  • 22
  • Next