AWS security scanner with attack chain detection. 47 checks, Terraform remediation for every finding, scan diff. Free. pip install cloud-audit
From hackdb.comSearch
The ultimate Red Team toolkit for phishing operations.
From hackdb.comRuntime-first Windows thick client assessment tool. Identifies verified privilege escalation paths using Procmon and AccessCheck validation.
From hackdb.comAI geolocation platform identifying indoor/outdoor photo locations like hotel rooms and street views with verifiable evidence for OSINT and recon.
From hackdb.comOpen-source VAPT platform for red teams to plan, collaborate, and automate reporting for penetration testing projects and vulnerability management.
From hackdb.comEnd-to-end platform for AI security testing and automated red teaming. Identify vulnerabilities like prompt injection and data leakage across AI systems.
From hackdb.comAn automated, highly vulnerable Active Directory lab for practicing advanced internal penetration testing and red team attack techniques.
From hackdb.comNeutral benchmark for evaluating prompt injection detection systems across 4,300+ inputs including jailbreaks and adversarial prompting.
From hackdb.comAutomated testing platform to secure LLM agents against prompt injection, data leaks, and hallucinations through continuous adversarial red teaming.
From hackdb.comRust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.
From hackdb.comAdversary simulation provider offering manual penetration testing, phishing assessments, offensive security training, and technical tool development.
From hackdb.comOffensive auditor for MCP servers. Detects RCE, tool poisoning, credential leaks, and SSRF across stdio, HTTP, and SSE transports.
From hackdb.comSelf-hosted offensive security platform for managing engagements, findings, and delivery. Features on-prem AI reporting and real-time team collaboration.
From hackdb.comPremier hardware store for offensive security, providing Flipper Zero, Proxmark, Hak5 tools, SDR equipment, and specialized RFID cloning hardware.
From hackdb.comConvert registry exports into NTUSER.MAN hive files to stealthily inject HKCU keys without admin rights, bypassing EDR/AV registry API monitoring.
From hackdb.comCygeniq secures AI systems across their lifecycle with Hexashield AI, GRCortex AI, and CyberTiX AI.
From hackdb.comUnified exposure management platform for automated vulnerability scanning, attack surface monitoring, and cloud security posture management.
From hackdb.comNeroSwarm Deception Lab offers free cyber deception tools including honeytoken creation, honeypot script generation, and IP threat reputation checking.
From hackdb.comDLLHijackHunter is an automated scanner that uses canary DLLs to confirm hijacking vulnerabilities, UAC bypasses, and privilege escalation on Windows.
From hackdb.com