LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Flamingo
Infrastructure Security
Visit Website

Flamingo

Details

Captures credentials sprayed across the network by various IT and security products, supporting protocols like SSH, HTTP, LDAP, DNS, FTP, and SNMP.

Internal
image of Flipper Zero
Wireless SecurityPhysical Security
Visit Website

Flipper Zero

Details

Flipper Zero is a portable multi-tool for pentesters and geeks, designed for exploring access control systems, radio protocols, and hardware.

WirelessPhysical
image of Freeway
Wireless SecurityRed Team Operations
Visit Website

Freeway

Details

Freeway: Python-based WiFi penetration testing tool for ethical hackers and pentesters to audit and secure networks.

Wireless
image of Frida
Reverse EngineeringApplication SecurityExploit Development
Visit Website

Frida

Details

Frida is a dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers to analyze and modify application behavior.

Mobile
image of GEF
Reverse EngineeringExploit Development
Visit Website

GEF

Details

GEF is a kick-ass set of commands for GDB to make it cool again for exploit dev and reverse engineering on X86, ARM, MIPS, PowerPC, and SPARC.

External
image of GIAC GPEN
CertificationsRed Team Operations
Visit Website

GIAC GPEN

Details

The GPEN certification validates a professional's ability to conduct penetration tests using best-practice techniques and methodologies.

CertificationsTraining
image of GIAC GWAPT
CertificationsTraining
Visit Website

GIAC GWAPT

Details

The GWAPT certification validates web application penetration testing skills, covering exploits, security issues, and testing methodologies.

CertificationsTraining
image of GL.iNet
Wireless Security
Visit Website

GL.iNet

Details

GL.iNet provides secure network hardware and software solutions for homes, offices, and industrial facilities, enabling a smarter lifestyle.

Wireless
image of GTFOBins
Infrastructure Security
Visit Website

GTFOBins

Details

GTFOBins is a curated list of Unix binaries to bypass local security restrictions in misconfigured systems, aiding pentesters and researchers.

Internal
image of Gandalf
AI Security
Visit Website

Gandalf

Details

Gandalf is a prompting skills test by Lakera that challenges users to extract secret information from a large language model.

AI
image of GeoSpy
Social EngineeringReconnaissance
Visit Website

GeoSpy

Details

GeoSpy is an AI-powered tool for precise photo geolocation, aiding investigations, OSINT, and location discovery with meter-level accuracy.

OSINT
image of Ghauri
Application Security
Visit Website

Ghauri

Details

Ghauri is a cross-platform tool for detecting and exploiting SQL injection flaws, automating the process for security professionals.

WebBug Bounty
  • Previous
  • 1
  • More pages
  • 8
  • 9
  • 10
  • More pages
  • 27
  • Next