LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of Wifiphisher
    Wireless Security
    Visit Website

    Wifiphisher

    Details

    Wifiphisher is a rogue access point framework for Wi-Fi security testing and red team engagements, enabling MITM and phishing attacks.

    Wireless
    • Previous
    • 1
    • More pages
    • 28
    • 29
    • 30
    • More pages
    • 33
    • Next
    image of Wifite2
    Wireless Security
    Visit Website

    Wifite2

    Details

    Wifite2 is a Python script for auditing wireless networks, automating various attacks to retrieve network passwords.

    Wireless
    image of Wonka
    Infrastructure Security
    Visit Website

    Wonka

    Details

    Wonka is a Windows tool for extracting Kerberos tickets from the Local Security Authority (LSA) cache for security research and penetration testing.

    Internal
    image of WuppieFuzz
    API Security
    Visit Website

    WuppieFuzz

    Details

    WuppieFuzz: coverage-guided REST API fuzzer using LibAFL, easy-to-use, explainable flaws, modular, supports black/grey/white box testing.

    API
    image of XBOW
    AI SecurityApplication SecurityVulnerability IntelligenceRed Team Operations
    Visit Website

    XBOW

    Details

    AI-powered penetration testing platform that scales offensive security, discovers vulnerabilities, and validates exploits with AI agents.

    AIWebAPIVulnerability IntelligenceServices+2
    image of XSStrike
    Application Security
    Visit Website

    XSStrike

    Details

    XSStrike is an advanced XSS detection suite with intelligent payload generation, fuzzing engine, and fast crawler for web security.

    WebBug Bounty
    image of Xygeni Security
    AI SecurityApplication SecurityVulnerability IntelligenceInfrastructure Security
    Visit Website

    Xygeni Security

    Details

    Xygeni is an AI-powered ASPM platform that secures the software supply chain by detecting malware, secrets, and vulnerabilities across CI/CD pipelines.

    AIStatic AnalysisVulnerability IntelligenceOSINTAPI
    image of Zero Day Initiative
    Vulnerability Intelligence
    Visit Website

    Zero Day Initiative

    Details

    Zero Day Initiative publishes advisories on vulnerabilities discovered by their researchers, providing details and links to vendor fixes.

    Vulnerability Intelligence
    image of Zero-Point Security Courses
    Training
    Visit Website

    Zero-Point Security Courses

    Details

    Zero-Point Security offers specialized training courses in various cybersecurity domains, enhancing practical skills for professionals.

    TrainingCertifications
    Screenshot of ZigStrike
    Exploit DevelopmentRed Team Operations
    Visit Website

    ZigStrike

    Details

    ZigStrike is a shellcode loader with injection techniques and anti-sandbox features, using compile-time capabilities for shellcode allocation.

    Internal
    image of ZoomEye
    Reconnaissance
    Visit Website

    ZoomEye

    Details

    ZoomEye is a cyberspace search engine for discovering and analyzing internet-connected devices, offering tools for asset discovery and vulnerability analysis.

    External
    image of angr
    Reverse EngineeringExploit Development
    Visit Website

    angr

    Details

    angr is a platform-agnostic binary analysis framework for reverse engineering and vulnerability research.

    Static Analysis