LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of Prowler
    Cloud Security
    Visit Website

    Prowler

    Details

    Prowler is an open-source cloud security tool empowering cloud engineers with customizable security checks across AWS, Azure, GCP, and Kubernetes.

    Cloud
    • Previous
    • 1
    • More pages
    • 21
    • 22
    • 23
    • More pages
    • 33
    • Next
    image of Proxmark
    Wireless SecurityPhysical SecurityRed Team Operations
    Visit Website

    Proxmark

    Details

    Proxmark is a versatile RFID tool for cloning Mifare and HID tags, ideal for penetration testing, research, and development in RFID security.

    WirelessPhysical
    image of ProxyChains
    Infrastructure Security
    Visit Website

    ProxyChains

    Details

    ProxyChains is a tool to force TCP connections through proxies like TOR, supporting SOCKS4/5 and HTTP(S) with user/pass and basic auth.

    Internal
    image of ProxyOrb
    Application Security
    Visit Website

    ProxyOrb

    Details

    ProxyOrb offers a free web proxy and online proxy browser for secure, anonymous access to blocked websites, featuring military-grade encryption.

    WebExternal
    image of PsExec
    Infrastructure SecurityRed Team Operations
    Visit Website

    PsExec

    Details

    PsExec lets you execute processes on remote systems, complete with full interactivity for console applications, without client software installation.

    InternalExternal
    image of Pupy
    Exploit DevelopmentRed Team OperationsInfrastructure Security
    Visit Website

    Pupy

    Details

    Pupy is a cross-platform post-exploitation framework and RAT, enabling in-memory execution and low-footprint operations across multiple OS.

    C2
    image of PwnDoc
    Reporting
    Visit Website

    PwnDoc

    Details

    PwnDoc is a pentest reporting application that simplifies writing findings and generating customizable Docx reports, saving time on documentation.

    Report
    image of Pwned Labs
    TrainingCloud Security
    Visit Website

    Pwned Labs

    Details

    Pwned Labs offers interactive, real-world cloud security labs for cybersecurity professionals to upskill affordably and effectively.

    TrainingCloudCertifications
    image of Pwntools
    Reverse EngineeringExploit DevelopmentRed Team Operations
    Visit Website

    Pwntools

    Details

    Pwntools is a CTF framework and exploit development library written in Python, designed for rapid prototyping and exploit creation.

    External
    image of PyRIT
    AI Security
    Visit Website

    PyRIT

    Details

    PyRIT is an open-source Python framework empowering security pros to proactively identify risks in generative AI systems.

    AI
    image of Qualys SSL Labs
    Application Security
    Visit Website

    Qualys SSL Labs

    Details

    Qualys SSL Labs provides a free online service to perform deep analysis of the configuration of any SSL web server on the public Internet.

    Web
    image of RESTler
    API SecurityCloud Security
    Visit Website

    RESTler

    Details

    RESTler is a stateful REST API fuzzing tool for automatically testing cloud services and finding security and reliability bugs.

    APIBug Bounty