LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of DDoS-Ripper
    Red Team OperationsInfrastructure Security
    Visit Website

    DDoS-Ripper

    Details

    DDos Ripper is a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic.

    DoS
    • Previous
    • 1
    • More pages
    • 7
    • 8
    • 9
    • More pages
    • 33
    • Next
    image of DLLHijackHunter
    Application SecurityBug BountyRed Team Operations
    Visit Website

    DLLHijackHunter

    Details

    DLLHijackHunter is an automated scanner that uses canary DLLs to confirm hijacking vulnerabilities, UAC bypasses, and privilege escalation on Windows.

    Bug BountyStatic AnalysisInternal
    image of DNSDumpster
    Reconnaissance
    Visit Website

    DNSDumpster

    Details

    DNSDumpster is a free domain research tool for discovering hosts, DNS records, and attack surfaces related to a domain.

    External
    Screenshot of DSViper
    Exploit DevelopmentRed Team Operations
    Visit Website

    DSViper

    Details

    DSViper is a tool to bypass Windows Defender, enabling payload execution without triggering security alerts for ethical use.

    Internal
    image of Dalfox
    Application SecurityAPI Security
    Visit Website

    Dalfox

    Details

    Dalfox is a powerful open-source XSS scanner and utility focused on automation, designed for detecting and verifying XSS vulnerabilities.

    WebBug BountyStatic AnalysisAPI
    image of DeHashed
    Reconnaissance
    Visit Website

    DeHashed

    Details

    DeHashed is a powerful search engine for compromised credentials and breach data used in threat intelligence and reconnaissance.

    External
    image of DeepLearning.AI
    TrainingCertifications
    Visit Website

    DeepLearning.AI

    Details

    Offers online AI courses and certifications by Andrew Ng, helping individuals and organizations build AI skills and stay ahead in the industry.

    Training
    image of DefectDojo
    Reporting
    Visit Website

    DefectDojo

    Details

    DefectDojo automates application security vulnerability management, unifying security tools and streamlining DevSecOps workflows.

    Report
    image of Dradis Community Edition
    Reporting
    Visit Website

    Dradis Community Edition

    Details

    Dradis CE is an open-source reporting and collaboration tool for InfoSec professionals to streamline security project reporting for free.

    Report
    image of Dradis Pro
    Reporting
    Visit Website

    Dradis Pro

    Details

    Dradis Pro streamlines pentesting with collaboration, automation, and consistent reporting, trusted by security teams worldwide.

    Report
    image of DragonOS
    Wireless Security
    Visit Website

    DragonOS

    Details

    DragonOS is an out-of-the-box operating system tailored for software-defined radios (SDRs), available for Raspberry Pi and x86-64 architectures.

    Wireless
    image of Dryrun Security
    Application Security
    Visit Website

    Dryrun Security

    Details

    AI-powered security agents that detect logic flaws, authorization gaps, and IDOR, preventing code risks in modern applications.

    Static Analysis