LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of garak
    AI Security
    Visit Website

    garak

    Details

    Garak is an LLM vulnerability scanner that probes for weaknesses like prompt injection, data leakage, hallucination, and toxicity.

    AI
    • Previous
    • 1
    • 2
    • More pages
    • 31
    • 32
    • 33
    • Next
    image of graphw00f
    API Security
    Visit Website

    graphw00f

    Details

    Graphw00f is a GraphQL server engine fingerprinting tool. It identifies backend technologies and security defenses by analyzing unique endpoint responses.

    API
    image of hashcat
    Infrastructure Security
    Visit Website

    hashcat

    Details

    World's fastest password recovery utility, supporting CPUs, GPUs, and hardware accelerators on Linux, Windows, and macOS.

    WirelessInternalExternalBruteforce
    image of hostap
    Wireless Security
    Visit Website

    hostap

    Details

    hostap is a project providing hostapd, a user space daemon for access point and authentication server functionality, and wpa_supplicant.

    Wireless
    image of hostapd-mana
    Wireless Security
    Visit Website

    hostapd-mana

    Details

    Modified hostapd for advanced wifi attacks, enabling rogue access points and sophisticated wireless penetration testing scenarios.

    Wireless
    image of hostapd-wpe
    Wireless Security
    Visit Website

    hostapd-wpe

    Details

    Modified hostapd to facilitate AP impersonation attacks, obtaining client credentials and enabling further attacks.

    Wireless
    image of hping3
    Infrastructure SecurityRed Team Operations
    Visit Website

    hping3

    Details

    hping3 is a network security tool for crafting custom TCP/IP packets. It is used by red teams for port scanning, firewall testing, and DDoS simulation.

    DoS
    image of httpx
    ReconnaissanceApplication SecurityBug Bounty
    Visit Website

    httpx

    Details

    httpx is a fast and multi-purpose HTTP toolkit for reconnaissance, probing, and information gathering with retries and backoffs.

    OSINTBug Bounty
    image of iSH-tools
    Reconnaissance
    Visit Website

    iSH-tools

    Details

    Ethical hacking toolkit for iOS devices using iSH Shell, providing various security and reconnaissance tools for mobile pen-testing.

    Mobile
    image of mimikatz
    Exploit DevelopmentRed Team OperationsInfrastructure Security
    Visit Website

    mimikatz

    Details

    Mimikatz is a tool to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory on Windows systems.

    InternalReport
    image of mingw-w64
    Reverse EngineeringExploit Development
    Visit Website

    mingw-w64

    Details

    A complete runtime environment for GCC & LLVM on Windows (x86, x64, ARM64), enabling native Windows application and library development.

    Internal
    image of mingw-woarm64-build
    Exploit Development
    Visit Website

    mingw-woarm64-build

    Details

    Build scripts for aarch64-w64-mingw32 Windows on Arm64 GNU cross-compiler, enabling Windows binary creation on Linux hosts.

    Internal