Submit your favorite resources for free.
Browse the newest offensive security tools, platforms, and services recently added to HackDB.
A recursive internet scanner for hackers, designed to automate Recon, Bug Bounties, and ASM with a focus on comprehensive subdomain enumeration.
Commix is an open-source penetration testing tool for detecting and exploiting command injection vulnerabilities in web applications.
A multi-threaded application to turn single-threaded command line applications into faster, more efficient tools with CIDR and glob support.
A Postman recon/OSINT framework for automated API endpoint discovery and secret exploitation in workspaces, collections, requests, users, and teams.
A lightweight GPT model trained to discover subdomains, aiding in reconnaissance and bug bounty hunting.
A tool to de-clutter lists of URLs by removing redundant parameters, extensions, and unwanted content, enhancing reconnaissance.
A command-line tool to gather dork results from various search engines, aiding in reconnaissance and vulnerability discovery.
A python tool to discover endpoints, potential parameters, and target-specific wordlists by crawling or analyzing various input sources.
Finds more links from Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X, and downloads archived responses.
Collect Nuclei YAML templates from public repositories for streamlined bug bounty hunting and security research.
A MitM tool for relaying attacks, featuring DHCPv6 DNS takeover and local name resolution spoofing (mDNS, LLMNR, NetBIOS-NS).
Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups.