LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of npk
    Infrastructure Security
    Visit Website

    npk

    Details

    A mostly-serverless distributed hash cracking platform built on AWS, designed for easy deployment and intuitive use.

    Bruteforce
    • Previous
    • 1
    • 2
    • More pages
    • 31
    • 32
    • 33
    • Next
    image of objection
    Reverse EngineeringApplication SecurityExploit Development
    Visit Website

    objection

    Details

    objection is a runtime mobile exploration toolkit for assessing mobile app security posture without needing a jailbreak.

    MobileStatic Analysis
    image of powercat
    Red Team OperationsInfrastructure Security
    Visit Website

    powercat

    Details

    Powercat: PowerShell version of Netcat, enabling network connectivity and data transfer with various protocols and payload generation.

    C2Internal
    image of pretender
    Infrastructure Security
    Visit Website

    pretender

    Details

    A MitM tool for relaying attacks, featuring DHCPv6 DNS takeover and local name resolution spoofing (mDNS, LLMNR, NetBIOS-NS).

    Internal
    image of pwndbg
    Reverse EngineeringExploit Development
    Visit Website

    pwndbg

    Details

    Pwndbg is a GDB/LLDB plugin for exploit development and reverse engineering, simplifying debugging with advanced features.

    External
    image of pypykatz
    Red Team OperationsInfrastructure Security
    Visit Website

    pypykatz

    Details

    pypykatz is a pure Python Mimikatz implementation for extracting credentials and secrets from Windows systems and memory dumps.

    InternalExternal
    image of reNgine
    Application SecurityReconnaissanceRed Team Operations
    Visit Website

    reNgine

    Details

    reNgine is an automated web reconnaissance framework streamlining the recon process for security professionals and bug bounty hunters.

    Bug BountyWebReport
    image of reconFTW
    ReconnaissanceApplication SecurityBug Bounty
    Visit Website

    reconFTW

    Details

    reconFTW automates reconnaissance, subdomain enumeration, and vulnerability checks, providing comprehensive target information.

    Bug BountyWebOSINT
    image of shcheck
    Application Security
    Visit Website

    shcheck

    Details

    shcheck is a tool to check security headers of a website, reporting which are enabled and which are not.

    Web
    image of sqlmap
    Application Security
    Visit Website

    sqlmap

    Details

    sqlmap is an automatic SQL injection and database takeover tool for penetration testing and vulnerability detection.

    WebMobileAPIBug Bounty
    image of subwiz
    ReconnaissanceBug Bounty
    Visit Website

    subwiz

    Details

    A lightweight GPT model trained to discover subdomains, aiding in reconnaissance and bug bounty hunting.

    Bug BountyOSINTWeb
    image of theHarvester
    ReconnaissanceBug Bounty
    Visit Website

    theHarvester

    Details

    theHarvester is an OSINT tool for gathering emails, subdomains, IPs, and URLs to determine a domain's external threat landscape.

    OSINT