LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of ROADtools
    Cloud SecurityInfrastructure SecurityReconnaissance
    Visit Website

    ROADtools

    Details

    ROADtools is a framework for Azure AD security, offering tools for offensive and defensive purposes, including ROADrecon and roadtx.

    InternalExternalCloud
    • Previous
    • 1
    • More pages
    • 22
    • 23
    • 24
    • More pages
    • 33
    • Next
    image of Red Button
    Cloud SecurityInfrastructure SecuritySecurity Firms
    Visit Website

    Red Button

    Details

    Red Button provides DDoS protection services, including testing, mitigation, and technology hardening, helping enterprises secure their infrastructure.

    ServicesDoS
    image of Red Team Ops
    TrainingCertifications
    Visit Website

    Red Team Ops

    Details

    Learn red teaming principles, tools, and techniques, from initial compromise to domain takeover, with OPSEC and defense bypass.

    TrainingCertifications
    image of Red Team Tools
    Red Team OperationsPhysical Security
    Visit Website

    Red Team Tools

    Details

    Red Team Tools provides professional-grade physical entry gear for red teaming, including lock picks, RFID cloners, and tactical covert entry equipment.

    Physical
    image of RedWolf Security
    Cloud SecurityInfrastructure SecuritySecurity Firms
    Visit Website

    RedWolf Security

    Details

    RedWolf Security provides enterprise-grade DDoS testing and threat simulation to validate defenses and improve security operations since 2006.

    ServicesDoS
    image of Responder
    Infrastructure SecurityReconnaissance
    Visit Website

    Responder

    Details

    Responder is a LLMNR, NBT-NS and MDNS poisoner with built-in rogue authentication servers for capturing credentials and performing relay attacks.

    Internal
    image of Retire.js
    Application Security
    Visit Website

    Retire.js

    Details

    Retire.js: Scans web/Node.js apps for vulnerable JS libraries & generates SBOMs, aiding in identifying & mitigating security risks.

    WebStatic Analysis
    image of Rubeus
    Infrastructure Security
    Visit Website

    Rubeus

    Details

    Rubeus is a C# toolset for raw Kerberos interaction and abuses, heavily adapted from Kekeo and MakeMeEnterpriseAdmin projects.

    BruteforceInternal
    image of RunSybil
    AI SecurityVulnerability IntelligenceRed Team OperationsApplication SecurityAPI Security
    Visit Website

    RunSybil

    Details

    AI-driven pentesting platform automating hacker intuition to find vulnerabilities before exploits, reducing discovery costs.

    AIVulnerability IntelligenceReportAPIWeb+4
    image of RustScan
    ReconnaissanceInfrastructure Security
    Visit Website

    RustScan

    Details

    RustScan: lightning-fast port scanner automating Nmap integration with adaptive learning for efficient network reconnaissance and security audits.

    External
    image of S3Scanner
    Cloud SecurityReconnaissanceInfrastructure Security
    Visit Website

    S3Scanner

    Details

    S3Scanner finds misconfigured S3 buckets across various cloud providers, enhancing cloud security posture and data leak prevention.

    Bug BountyWebCloud
    image of SILPH
    Red Team Operations
    Visit Website

    SILPH

    Details

    Stealthy In-Memory Local Password Harvester (SILPH) dumps LSA secrets, SAM hashes, and DCC2 credentials without writing to disk.

    C2Internal