LogoHackDB
  • Recent
  • Search
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
🎉Follow HackDB onX (Twitter)

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
392+

392+ listings on HackDB

Explore

Offensive security resources

Browse curated tools, platforms, and services for offensive security teams.

Recent

See the newest tools, platforms, and services added to HackDB.

Category

Browse offensive security resources organized by category.

Tag

Discover offensive security resources related to a specific tag.

Submit

Submit and promote your security resources.

Recent

Latest resources

The newest offensive security tools, platforms, and services added to HackDB.

image of NeroSwarm Deception Lab
Red Team OperationsInfrastructure SecurityReconnaissance
Visit Website

NeroSwarm Deception Lab

Details

NeroSwarm Deception Lab offers free cyber deception tools including honeytoken creation, honeypot script generation, and IP threat reputation checking.

OSINTInternalExternal
image of DLLHijackHunter
Application SecurityBug BountyRed Team Operations
Visit Website

DLLHijackHunter

Details

Automated DLL Hijacking Detection Tool with Zero False Positives — Discovers, filters, and canary-confirms exploitable DLL hijacks on Windows with tiered confidence scoring.

Bug BountyStatic AnalysisInternal
image of Nerva
ReconnaissanceInfrastructure SecurityRed Team OperationsBug Bounty
Visit Website

Nerva

Details

Nerva is a high-performance CLI tool for fast service fingerprinting across 120+ protocols (TCP/UDP/SCTP), built by Praetorian for network reconnaissance.

OSINTExternalInternal
image of TapDucky
Red Team OperationsInfrastructure Security
Visit Website

TapDucky

Details

TapDucky turns any rooted phone into the legendary USB Rubber Ducky, enabling Android USB HID keystroke injection for authorized testing and automation.

Internal
image of DDoS-Ripper
Red Team OperationsInfrastructure Security
Visit Website

DDoS-Ripper

Details

DDos Ripper is a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic.

DoS
image of CC-attack
Red Team OperationsInfrastructure Security
Visit Website

CC-attack

Details

A Python3 script for performing multithreading HTTP/HTTPS flood (CC) attacks using SOCKS4/5 or HTTP proxies.

DoS
Recent resources
Featured

Featured

Highlighted offensive security tools, platforms, and services featured across HackDB.

image of Vulnetic Hacking Agent
AI SecurityExploit DevelopmentRed Team OperationsVulnerability Intelligence
Visit Website

Vulnetic Hacking Agent

Details

Vulnetic AI is a high-performance hacking agent built for serious penetration testing at a fraction of typical costs.

APICloudExternalInternalServices+1
image of HexStrike AI
AI SecurityApplication SecurityBug Bounty
Visit Website

HexStrike AI

Details

AI-powered cybersecurity automation platform with 150+ tools and autonomous AI agents for pentesting, vulnerability discovery, and bug bounty automation.

AIBug Bounty
image of GuidedHacking
Reverse EngineeringExploit DevelopmentApplication Security
Visit Website

GuidedHacking

Details

Guided Hacking is the #1 source for learning game hacking since 2011. Guided Hacking is devoted to producing high quality educational content related to game hacking & reverse engineering.

TrainingStatic Analysis
image of BloodHound Community Edition
Infrastructure Security
Visit Website

BloodHound Community Edition

Details

BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

ReportInternal
image of Caldera
Red Team Operations
Visit Website

Caldera

Details

CALDERA is an automated adversary emulation system that leverages the MITRE ATT&CK framework to assess security posture and detect gaps.

External
image of Evilginx Pro
Red Team OperationsSocial Engineering
Visit Website

Evilginx Pro

Details

Evilginx Pro is a phishing framework designed for red teams, enabling advanced phishing attacks with features like session hijacking and credential harvesting.

ServicesExternalReport
Search resources
Category

Explore by category

Browse offensive security resources organized by category.

AI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTraining
API SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability Intelligence
Application SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless Security
View all categories
Tag

Explore by tag

Discover offensive security resources related to a specific tag.

internalexternalwebtrainingbug-bountyapireportaiosintwirelessstatic-analysisservicescertificationsvulnerability-intelligencec2cloudmobilephysicalphishingbruteforcedosclassification
View all tags
Pricing

Submit or promote your resource

Free and paid options for getting your security resource listed and promoted on HackDB.

free

For Beginners

$0

Reviewed and listed within 72 hours.

Permanent listing with no backlink required.

pro

For Pro Users

$9.99

Publish right away and schedule when it goes live.

Featured on the homepage and at the top of listings.

sponsor

For Sponsors

$19.99

/ week

Everything in Pro plan.

Promote your resource on almost every page.

View pricing

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates