LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

Category

Explore by categories

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Steampipe
Cloud SecurityInfrastructure Security
Visit Website

Steampipe

Details

Steampipe: Query your cloud, code, logs & more with SQL. Build benchmarks & dashboards for security & insights. Zero-ETL from 140+ sources.

ExternalInternal
image of THC-Hydra
Infrastructure SecurityReconnaissanceReverse Engineering
Visit Website

THC-Hydra

Details

THC-Hydra is a fast network login cracker supporting numerous protocols; a valuable tool for security researchers and consultants.

Bruteforce
image of Tenable
Security FirmsReportingApplication SecurityInfrastructure Security
Visit Website

Tenable

Details

Tenable's exposure management platform helps organizations find, prioritize, and fix cyber risks across IT, cloud, OT, and identity environments.

APIReportWebServicesExternal+3
image of WPScan
Application SecurityInfrastructure SecurityReporting
Visit Website

WPScan

Details

WPScan is a vulnerability database and security scanner for WordPress, helping users identify and address security risks in their WP sites.

WebReportServicesExternal
image of WSASS
Infrastructure Security
Visit Website

WSASS

Details

A tool to dump the LSASS process on modern Windows 11 using the old WerfaultSecure.exe program, outputting in Windows MINIDUMP format.

Internal
image of Wonka
Infrastructure Security
Visit Website

Wonka

Details

Wonka is a Windows tool for extracting Kerberos tickets from the Local Security Authority (LSA) cache for security research and penetration testing.

Internal
image of hashcat
Infrastructure Security
Visit Website

hashcat

Details

World's fastest password recovery utility, supporting CPUs, GPUs, and hardware accelerators on Linux, Windows, and macOS.

WirelessInternalExternalBruteforce
image of mimikatz
Exploit DevelopmentRed Team OperationsInfrastructure Security
Visit Website

mimikatz

Details

Mimikatz is a tool to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory on Windows systems.

InternalReport
image of powercat
Red Team OperationsInfrastructure Security
Visit Website

powercat

Details

Powercat: PowerShell version of Netcat, enabling network connectivity and data transfer with various protocols and payload generation.

C2Internal
image of pypykatz
Red Team OperationsInfrastructure Security
Visit Website

pypykatz

Details

pypykatz is a pure Python Mimikatz implementation for extracting credentials and secrets from Windows systems and memory dumps.

InternalExternal
image of winPEAS
Infrastructure Security
Visit Website

winPEAS

Details

PEASS-ng/winPEAS is a suite of scripts designed to identify potential privilege escalation paths on Windows systems.

Internal
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next