LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

Category

Explore by categories

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of BloodHound Community Edition
Infrastructure Security
Visit Website

BloodHound Community Edition

Details

BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

ReportInternal
image of Metasploit
Infrastructure Security
Visit Website

Metasploit

Details

Metasploit is a penetration testing framework that helps security teams verify vulnerabilities, manage assessments, and improve security awareness.

WebExternalServices
image of AzureHound
Cloud SecurityInfrastructure SecurityReconnaissance
Visit Website

AzureHound

Details

AzureHound is a BloodHound data collector for Microsoft Azure, enabling security professionals to map attack paths in Azure environments.

Cloud
image of Canarytokens
Infrastructure SecurityRed Team OperationsReporting
Visit Website

Canarytokens

Details

Canarytokens is a free tool to plant traps in your network that notify you when triggered, helping you detect breaches early.

Phishing
image of CloudFox
Cloud SecurityInfrastructure Security
Visit Website

CloudFox

Details

CloudFox helps penetration testers find exploitable attack paths in cloud infrastructure, currently supporting AWS with more on the way.

Cloud
image of CloudQuery
Cloud SecurityInfrastructure Security
Visit Website

CloudQuery

Details

CloudQuery provides a developer-first cloud governance platform for security, compliance, and cost visibility across multi-cloud environments.

ReportCloud
image of CrackMapExec
Infrastructure Security
Visit Website

CrackMapExec

Details

CrackMapExec is a swiss army knife for pentesting Windows networks, automating common tasks for assessing security vulnerabilities.

Internal
image of Evil-WinRM
Infrastructure Security
Visit Website

Evil-WinRM

Details

Evil-WinRM is the ultimate WinRM shell for hacking/pentesting, offering features like in-memory script loading and AMSI bypass.

Internal
image of Gobuster
Application SecurityReconnaissanceInfrastructure Security
Visit Website

Gobuster

Details

Gobuster is a tool to brute-force URIs, DNS subdomains, and virtual hostnames, aiding in web application reconnaissance.

WebExternalBug BountyClassification
image of John the Ripper jumbo
Infrastructure Security
Visit Website

John the Ripper jumbo

Details

John the Ripper jumbo is an advanced password cracker supporting hundreds of hash types and running on various platforms.

WirelessWebInternalExternalBruteforce
image of Kali Linux
Infrastructure SecurityReverse EngineeringExploit DevelopmentWireless SecurityRed Team Operations
Visit Website

Kali Linux

Details

Kali Linux is a Debian-based distribution for penetration testing, ethical hacking, and network security assessments, offering a vast array of tools.

WirelessMobileExternalInternal
image of Ligolo-ng
Red Team OperationsInfrastructure Security
Visit Website

Ligolo-ng

Details

Ligolo-ng: Advanced tunneling tool using TUN interfaces for pentesters, enabling network access without SOCKS proxies.

Internal
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next