LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of Have I Been Pwned
    ReconnaissanceSocial Engineering
    Visit Website

    Have I Been Pwned

    Details

    Have I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.

    External
    • Previous
    • 1
    • More pages
    • 12
    • 13
    • 14
    • More pages
    • 33
    • Next
    image of Havoc
    Red Team Operations
    Visit Website

    Havoc

    Details

    Havoc is a modern, malleable post-exploitation C2 framework with sleep obfuscation, return address spoofing, and indirect syscalls.

    InternalExternalC2
    image of Holehe
    ReconnaissanceSocial Engineering
    Visit Website

    Holehe

    Details

    Holehe is an OSINT tool to discover accounts linked to an email across 120+ sites using password recovery & registration methods.

    External
    image of Hunter.io
    ReconnaissanceSocial Engineering
    Visit Website

    Hunter.io

    Details

    Hunter.io is an email outreach platform to find and verify professional email addresses and send cold emails to connect with leads.

    External
    image of Huntr
    AI SecurityBug Bounty
    Visit Website

    Huntr

    Details

    huntr is a bug bounty platform for AI and machine learning. It allows red teams to find and disclose vulnerabilities in open-source models and AI systems.

    Bug BountyAI
    image of ICopyX
    Physical SecurityRed Team Operations
    Visit Website

    ICopyX

    Details

    The iCopy-X is a portable RFID cloning tool for pentesters, security researchers, locksmiths, and hobbyists, simplifying RFID tag duplication.

    WirelessPhysical
    image of IDA Pro
    Reverse EngineeringExploit Development
    Visit Website

    IDA Pro

    Details

    IDA Pro: The ultimate multi-platform, multi-processor reverse engineering and malware analysis tool with a powerful disassembler and debugger.

    Static Analysis
    image of IPinfo
    Vulnerability IntelligenceReconnaissance
    Visit Website

    IPinfo

    Details

    IPinfo provides comprehensive IP address data, geolocation, and intelligence for developers and enterprises, powering applications and security solutions.

    OSINTVulnerability Intelligence
    image of Impacket
    Infrastructure Security
    Visit Website

    Impacket

    Details

    Impacket is a collection of Python classes for working with network protocols, focused on low-level packet access and protocol implementation.

    Internal
    image of Impacket
    Infrastructure Security
    Visit Website

    Impacket

    Details

    Impacket is a collection of Python classes for working with network protocols, providing low-level access to packets and protocol implementation.

    Internal
    image of InQL
    API Security
    Visit Website

    InQL

    Details

    InQL is a Burp Suite extension for advanced GraphQL testing, offering vulnerability detection and customizable scans.

    API
    image of Intelligence X
    Reconnaissance
    Visit Website

    Intelligence X

    Details

    Intelligence X is a search engine and data archive for searching Tor, I2P, data leaks, and the public web by email, domain, IP, and more.

    WebExternal