LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

Category

Explore by categories

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
  • All

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Mythic
Red Team Operations
Visit Website

Mythic

Details

Mythic is a collaborative, multi-platform, red teaming framework with a user-friendly interface for operators and managers.

InternalExternalC2
image of NetExec
Red Team OperationsInfrastructure Security
Visit Website

NetExec

Details

NetExec is a network service exploitation tool designed to automate security assessments of large networks.

InternalServicesReportWeb
image of Nighthawk C2
Red Team Operations
Visit Website

Nighthawk C2

Details

Nighthawk is an advanced redteam toolkit designed with operational security in mind, offering a robust platform for red team operations.

C2
image of Nishang
Red Team Operations
Visit Website

Nishang

Details

Nishang is a PowerShell framework for offensive security, penetration testing, and red teaming, useful in all phases of security assessments.

Internal
image of OnionC2
Red Team Operations
Visit Website

OnionC2

Details

OnionC2: C2 framework with Tor integration for secure, anonymous command and control. Rust & Go powered, cross-platform, and user-friendly.

C2
image of Orsted C2
Red Team Operations
Visit Website

Orsted C2

Details

Orsted C2 is a command and control framework designed for educational purposes, enabling operators to interact with distributed beacons.

C2
image of Phishing Club
Social EngineeringRed Team Operations
Visit Website

Phishing Club

Details

Phishing Club is a phishing simulation and man-in-the-middle framework designed for companies and red teams to obtain initial access.

Phishing
image of Proxmark
Wireless SecurityPhysical SecurityRed Team Operations
Visit Website

Proxmark

Details

Proxmark is a versatile RFID tool for cloning Mifare and HID tags, ideal for penetration testing, research, and development in RFID security.

WirelessPhysical
image of PsExec
Infrastructure SecurityRed Team Operations
Visit Website

PsExec

Details

PsExec lets you execute processes on remote systems, complete with full interactivity for console applications, without client software installation.

InternalExternal
image of Pupy
Exploit DevelopmentRed Team OperationsInfrastructure Security
Visit Website

Pupy

Details

Pupy is a cross-platform post-exploitation framework and RAT, enabling in-memory execution and low-footprint operations across multiple OS.

C2
image of Pwntools
Reverse EngineeringExploit DevelopmentRed Team Operations
Visit Website

Pwntools

Details

Pwntools is a CTF framework and exploit development library written in Python, designed for rapid prototyping and exploit creation.

External
image of RunSybil
AI SecurityVulnerability IntelligenceRed Team OperationsApplication SecurityAPI Security
Visit Website

RunSybil

Details

AI-driven pentesting platform automating hacker intuition to find vulnerabilities before exploits, reducing discovery costs.

AIVulnerability IntelligenceReportAPIWeb+4
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next