LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

Category

Explore by categories

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Flamingo
Infrastructure Security
Visit Website

Flamingo

Details

Captures credentials sprayed across the network by various IT and security products, supporting protocols like SSH, HTTP, LDAP, DNS, FTP, and SNMP.

Internal
image of GTFOBins
Infrastructure Security
Visit Website

GTFOBins

Details

GTFOBins is a curated list of Unix binaries to bypass local security restrictions in misconfigured systems, aiding pentesters and researchers.

Internal
image of Gobuster
Application SecurityReconnaissanceInfrastructure Security
Visit Website

Gobuster

Details

Gobuster is a tool to brute-force URIs, DNS subdomains, and virtual hostnames, aiding in web application reconnaissance.

WebExternalBug BountyClassification
image of GodPotato
Infrastructure Security
Visit Website

GodPotato

Details

GodPotato is a privilege escalation tool for Windows, exploiting DCOM to elevate privileges to NT AUTHORITY\SYSTEM with ImpersonatePrivilege.

Internal
image of HORIZON3.ai
Infrastructure SecurityApplication SecurityRed Team Operations
Visit Website

HORIZON3.ai

Details

Next‑gen autonomous penetration testing with NodeZero®—Horizon3.ai uncovers real‑world attack paths across cloud, on‑prem, and hybrid environments without human intervention.

InternalExternalServices
image of Impacket
Infrastructure Security
Visit Website

Impacket

Details

Impacket is a collection of Python classes for working with network protocols, focused on low-level packet access and protocol implementation.

Internal
image of Impacket
Infrastructure Security
Visit Website

Impacket

Details

Impacket is a collection of Python classes for working with network protocols, providing low-level access to packets and protocol implementation.

Internal
image of John the Ripper jumbo
Infrastructure Security
Visit Website

John the Ripper jumbo

Details

John the Ripper jumbo is an advanced password cracker supporting hundreds of hash types and running on various platforms.

WirelessWebInternalExternalBruteforce
image of Kali Linux
Infrastructure SecurityReverse EngineeringExploit DevelopmentWireless SecurityRed Team Operations
Visit Website

Kali Linux

Details

Kali Linux is a Debian-based distribution for penetration testing, ethical hacking, and network security assessments, offering a vast array of tools.

WirelessMobileExternalInternal
image of Kerbrute
Infrastructure Security
Visit Website

Kerbrute

Details

Kerbrute is a tool for bruteforcing and enumerating valid Active Directory accounts via Kerberos pre-authentication.

Internal
image of LaZagne
Infrastructure SecurityReconnaissance
Visit Website

LaZagne

Details

LaZagne is an open-source password recovery tool designed to retrieve stored passwords from a local computer using various techniques.

Internal
image of Ligolo-ng
Red Team OperationsInfrastructure Security
Visit Website

Ligolo-ng

Details

Ligolo-ng: Advanced tunneling tool using TUN interfaces for pentesters, enabling network access without SOCKS proxies.

Internal
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next