LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of Interact.sh
    Application Security
    Visit Website

    Interactsh

    Details

    Interactsh is a tool and service for capturing and handling out-of-band interactions during security testing.

    InternalWebAPI
    • Previous
    • 1
    • More pages
    • 13
    • 14
    • 15
    • More pages
    • 33
    • Next
    image of Interlace
    Bug BountyReconnaissance
    Visit Website

    Interlace

    Details

    A multi-threaded application to turn single-threaded command line applications into faster, more efficient tools with CIDR and glob support.

    OSINTBug Bounty
    image of Intigriti
    Bug Bounty
    Visit Website

    Intigriti

    Details

    Intigriti: crowdsourced security platform offering bug bounty, VDP, and pentesting services, connecting businesses with ethical hackers.

    Bug Bounty
    image of Intruder
    Infrastructure SecurityCloud SecurityApplication SecurityAPI SecurityVulnerability IntelligenceReconnaissanceReporting
    Visit Website

    Intruder

    Details

    Unified vulnerability management and attack surface monitoring platform for continuous infrastructure, web app, and cloud security testing.

    WebCloudAPIVulnerability IntelligenceExternal+3
    image of InvisibilityCloak
    Exploit Development
    Visit Website

    InvisibilityCloak

    Details

    A proof-of-concept obfuscation toolkit for C# post-exploitation tools, designed to evade signature-based detection.

    Internal
    image of JWT Debugger
    Application SecurityAPI Security
    Visit Website

    JWT Debugger

    Details

    JWT Debugger is a web application to create, encode, decode, and debug JWT (JSON Web Tokens). It helps developers inspect claims and test token integrity.

    WebAPIStatic Analysis
    image of John the Ripper jumbo
    Infrastructure Security
    Visit Website

    John the Ripper jumbo

    Details

    John the Ripper jumbo is an advanced password cracker supporting hundreds of hash types and running on various platforms.

    WirelessWebInternalExternalBruteforce
    image of Julius
    AI SecurityReconnaissance
    Visit Website

    Julius

    Details

    Julius is an open-source LLM service fingerprinting tool that identifies Ollama, vLLM, LiteLLM, and 30+ other AI services running on network endpoints.

    AI
    image of Kali Linux
    Infrastructure SecurityReverse EngineeringExploit DevelopmentWireless SecurityRed Team Operations
    Visit Website

    Kali Linux

    Details

    Kali Linux is a Debian-based distribution for penetration testing, ethical hacking, and network security assessments, offering a vast array of tools.

    WirelessMobileExternalInternal
    image of Kerbrute
    Infrastructure Security
    Visit Website

    Kerbrute

    Details

    Kerbrute is a tool for bruteforcing and enumerating valid Active Directory accounts via Kerberos pre-authentication.

    Internal
    image of Kiterunner
    API SecurityReconnaissance
    Visit Website

    Kiterunner

    Details

    Kiterunner is a contextual content discovery tool for modern web applications and APIs, excelling in route/endpoint bruteforcing.

    APIBruteforceWeb
    image of KittySploit Framework
    Exploit DevelopmentReconnaissance
    Visit Website

    KittySploit Framework

    Details

    KittySploit is a modular exploitation framework featuring a web proxy and AI-powered analysis to help red teams automate recon and vulnerability research.

    ExternalOSINT