LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of GTFOBins
    Infrastructure Security
    Visit Website

    GTFOBins

    Details

    GTFOBins is a curated list of Unix binaries to bypass local security restrictions in misconfigured systems, aiding pentesters and researchers.

    Internal
    • Previous
    • 1
    • More pages
    • 10
    • 11
    • 12
    • More pages
    • 33
    • Next
    image of Gandalf
    AI Security
    Visit Website

    Gandalf

    Details

    Gandalf is a prompting skills test by Lakera that challenges users to extract secret information from a large language model.

    AI
    image of GeoSpy
    Social EngineeringReconnaissance
    Visit Website

    GeoSpy

    Details

    GeoSpy is an AI-powered tool for precise photo geolocation, aiding investigations, OSINT, and location discovery with meter-level accuracy.

    OSINT
    image of Ghauri
    Application Security
    Visit Website

    Ghauri

    Details

    Ghauri is a cross-platform tool for detecting and exploiting SQL injection flaws, automating the process for security professionals.

    WebBug Bounty
    image of Ghidra
    Reverse EngineeringExploit Development
    Visit Website

    Ghidra

    Details

    Ghidra is a software reverse engineering suite developed by the NSA. It includes tools for disassembly, decompilation, and analyzing malicious code.

    Static Analysis
    image of Ghostwriter
    Reporting
    Visit Website

    Ghostwriter

    Details

    SpecterOps Ghostwriter is a project management and reporting platform designed for security professionals to manage clients, projects, and reports.

    Report
    image of Gitleaks
    Application SecurityCloud Security
    Visit Website

    Gitleaks

    Details

    Gitleaks detects secrets like passwords, API keys, and tokens in git repositories, files, and standard input.

    Static Analysis
    image of Gobuster
    Application SecurityReconnaissanceInfrastructure Security
    Visit Website

    Gobuster

    Details

    Gobuster is a tool to brute-force URIs, DNS subdomains, and virtual hostnames, aiding in web application reconnaissance.

    WebExternalBug BountyClassification
    image of GodPotato
    Infrastructure Security
    Visit Website

    GodPotato

    Details

    GodPotato is a privilege escalation tool for Windows, exploiting DCOM to elevate privileges to NT AUTHORITY\SYSTEM with ImpersonatePrivilege.

    Internal
    image of Gophish
    Social Engineering
    Visit Website

    Gophish

    Details

    Gophish is a powerful open-source phishing toolkit designed to help organizations and security professionals conduct realistic phishing simulations.

    Phishing
    image of GraphQL Cop
    API Security
    Visit Website

    GraphQL Cop

    Details

    GraphQL Cop is a Python utility for running security tests against GraphQL APIs, ideal for CI/CD checks and vulnerability reproduction.

    API
    image of GraphQL Security
    API Security
    Visit Website

    GraphQL Security

    Details

    Assess the security of your GraphQL apps: authorization, access control, complexity limits, introspection, DDOS, and injections.

    API