LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of EAPHammer
    Wireless SecurityRed Team Operations
    Visit Website

    EAPHammer

    Details

    EAPHammer: Evil twin attacks against WPA2-Enterprise networks with hostile portal attacks and indirect wireless pivots.

    Wireless
    • Previous
    • 1
    • More pages
    • 8
    • 9
    • 10
    • More pages
    • 33
    • Next
    image of EAP_buster
    Wireless Security
    Visit Website

    EAP_buster

    Details

    EAP_buster lists supported EAP methods of a RADIUS server, aiding red teams and detecting rogue WPA-Enterprise access points.

    Wireless
    image of EC-Council
    TrainingCertifications
    Visit Website

    EC-Council

    Details

    EC-Council offers cybersecurity courses online, providing industry-recognized certifications and training for career advancement.

    TrainingCertificationsWebInternalServices+1
    image of Empire
    Red Team Operations
    Visit Website

    Empire

    Details

    Empire is a post-exploitation framework for red teams and penetration testers, featuring encrypted comms and a modular design.

    InternalExternalC2
    image of EnforsterAI
    AI SecurityApplication SecurityAPI SecurityCloud SecurityVulnerability Intelligence
    Visit Website

    EnforsterAI

    Details

    AI-native SAST tool for code security, detecting vulnerabilities, secrets, IaC issues, and AI model security with actionable AI fixes.

    AIStatic AnalysisAPICloudWeb+1
    image of Evil QR
    Social EngineeringRed Team Operations
    Visit Website

    Evil QR

    Details

    Evil QR is a toolkit demonstrating how attackers can take over accounts by convincing users to scan supplied QR codes through phishing.

    Phishing
    image of Evil-WinRM
    Infrastructure Security
    Visit Website

    Evil-WinRM

    Details

    Evil-WinRM is the ultimate WinRM shell for hacking/pentesting, offering features like in-memory script loading and AMSI bypass.

    Internal
    image of EvilCrowRF-V2
    Wireless SecurityRed Team OperationsPhysical Security
    Visit Website

    EvilCrowRF-V2

    Details

    Evil Crow RF V2: A radio frequency hacking device for pentesting and red team ops, operating across multiple bands with dual CC1101 modules.

    WirelessPhysicalBruteforce
    image of EvilWAF
    Application Security
    Visit Website

    EvilWAF

    Details

    EvilWAF is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).

    Web
    image of Evilginx Mastery
    Social EngineeringTraining
    Visit Website

    Evilginx Mastery

    Details

    Master advanced phishing techniques with Evilginx, bypass MFA, and learn to create custom phishlets for red team engagements.

    TrainingPhishing
    image of Exploit Database
    Vulnerability Intelligence
    Visit Website

    Exploit Database

    Details

    Exploit Database (Exploit-DB) is a curated repository of public exploits and proof-of-concepts for offensive and defensive security professionals.

    Vulnerability Intelligence
    image of Exploit.IN
    Vulnerability Intelligence
    Visit Website

    Exploit.IN

    Details

    Exploit.IN delivers the latest news, research, and tools concerning hacking, exploits, vulnerabilities, malware, and cybersecurity laws.

    Vulnerability Intelligence