LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

Tag

Explore by tags

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All

  • AI

  • API

  • Bruteforce

  • Bug Bounty

  • C2

  • Certifications

  • Classification

  • Cloud

  • DoS

  • External

  • Internal

  • Mobile

  • OSINT

  • Phishing

  • Physical

  • Report

  • Services

  • Static Analysis

  • Training

  • Vulnerability Intelligence

  • Web

  • Wireless

image of BloodHound Community Edition
Infrastructure Security
Visit Website

BloodHound Community Edition

Details

BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

ReportInternal
image of AutoRecon
ReconnaissanceInfrastructure Security
Visit Website

AutoRecon

Details

AutoRecon is a network reconnaissance tool that automates service enumeration and port scanning for multiple targets.

Internal
image of BC Security
Red Team Operations
Visit Website

BC Security

Details

BC Security provides cybersecurity assessments and training, offering technical expertise and compliance knowledge for today's business world.

Internal
image of BloodHound Query Library
Infrastructure Security
Visit Website

BloodHound Query Library

Details

BloodHound Query Library appears to be a resource for pre-built queries designed for use with BloodHound, a tool for analyzing Active Directory environments.

Internal
image of Brute Ratel C4
Red Team Operations
Visit Website

Brute Ratel C4

Details

Brute Ratel C4 is a customized command and control center designed for red team and adversary simulation, offering advanced evasion techniques.

ExternalC2Internal
image of Certipy
Infrastructure Security
Visit Website

Certipy

Details

Certipy is a toolkit for enumerating and abusing Active Directory Certificate Services (AD CS) with ESC1-ESC16 attack path support.

Internal
image of Chisel
Infrastructure Security
Visit Website

Chisel

Details

Chisel: A fast TCP/UDP tunnel over HTTP, secured via SSH. Useful for firewalls, providing secure network endpoints.

Internal
image of ChromeAlone
Red Team OperationsExploit Development
Visit Website

ChromeAlone

Details

ChromeAlone transforms Chromium browsers into C2 implants, enabling covert operations with session stealing, credential capture, and remote execution.

C2Internal
image of Cobalt Strike
Red Team Operations
Visit Website

Cobalt Strike

Details

Cobalt Strike: adversary simulation tool emulating advanced threat actors in IT networks using Beacon, a post-exploitation agent.

ExternalC2Internal
image of CrackMapExec
Infrastructure Security
Visit Website

CrackMapExec

Details

CrackMapExec is a swiss army knife for pentesting Windows networks, automating common tasks for assessing security vulnerabilities.

Internal
Screenshot of DSViper
Exploit DevelopmentRed Team Operations
Visit Website

DSViper

Details

DSViper is a tool to bypass Windows Defender, enabling payload execution without triggering security alerts for ethical use.

Internal
image of Dradis Pro
Reporting
Visit Website

Dradis Pro

Details

Dradis Pro streamlines pentesting with collaboration, automation, and consistent reporting, trusted by security teams worldwide.

ReportWebInternalServicesExternal
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next