LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

Tag

Explore by tags

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All

  • AI

  • API

  • Bruteforce

  • Bug Bounty

  • C2

  • Certifications

  • Classification

  • Cloud

  • DoS

  • External

  • Internal

  • Mobile

  • OSINT

  • Phishing

  • Physical

  • Report

  • Services

  • Static Analysis

  • Training

  • Vulnerability Intelligence

  • Web

  • Wireless

image of Intelligence X
Reconnaissance
Visit Website

Intelligence X

Details

Intelligence X is a search engine and data archive for searching Tor, I2P, data leaks, and the public web by email, domain, IP, and more.

WebExternal
image of John the Ripper jumbo
Infrastructure Security
Visit Website

John the Ripper jumbo

Details

John the Ripper jumbo is an advanced password cracker supporting hundreds of hash types and running on various platforms.

WirelessWebInternalExternalBruteforce
image of Kali Linux
Infrastructure SecurityReverse EngineeringExploit DevelopmentWireless SecurityRed Team Operations
Visit Website

Kali Linux

Details

Kali Linux is a Debian-based distribution for penetration testing, ethical hacking, and network security assessments, offering a vast array of tools.

WirelessMobileExternalInternal
image of Maltego
ReconnaissanceSocial Engineering
Visit Website

Maltego

Details

Maltego is an investigation platform that accelerates complex cyber investigations, used by security analysts and investigators worldwide.

External
image of Masscan
ReconnaissanceInfrastructure Security
Visit Website

Masscan

Details

Masscan is a TCP port scanner capable of scanning the entire Internet in under 5 minutes, transmitting 10 million packets per second.

External
image of Mythic
Red Team Operations
Visit Website

Mythic

Details

Mythic is a collaborative, multi-platform, red teaming framework with a user-friendly interface for operators and managers.

InternalExternalC2
image of Nessus Essentials
Application SecurityInfrastructure SecurityReporting
Visit Website

Nessus Essentials

Details

Nessus Essentials is a free vulnerability scanner by Tenable, offering high-speed, in-depth scanning for up to 16 IP addresses.

ReportInternalExternal
image of Nikto
Application SecurityReconnaissance
Visit Website

Nikto

Details

Nikto is an open-source web server scanner that performs comprehensive tests against web servers for multiple vulnerabilities.

WebExternal
image of Nmap
Infrastructure SecurityReconnaissance
Visit Website

Nmap

Details

Nmap is a free and open-source utility for network discovery and security auditing, used for tasks like network inventory and monitoring.

ExternalInternal
image of Nuclei
Application Security
Visit Website

Nuclei

Details

Nuclei is a fast, customizable vulnerability scanner using YAML templates to detect vulnerabilities in applications, networks, and cloud.

Bug BountyWebExternal
image of OWASP Amass
Reconnaissance
Visit Website

OWASP Amass

Details

OWASP Amass is a framework for attack surface management and external asset discovery using open source intelligence and reconnaissance.

External
image of Osintly
ReportingInfrastructure SecurityPhysical Security
Visit Website

Osintly

Details

Osintly is an OSINT (Open Source Intelligence) platform designed to empower your searches with precision and accuracy. Unlock the world’s information using our advanced OSINT tools and techniques.

OSINTExternalReportStatic AnalysisWeb+1
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next