LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
🎉Follow HackDB on

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
398+

398+ listings on HackDB

LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Newsletter

    Join the Community

    Subscribe to our newsletter for the latest news and updates

    Explore

    Offensive security resources

    Browse curated tools, platforms, and services for offensive security teams.

    Recent

    See the newest tools, platforms, and services added to HackDB.

    Category

    Browse offensive security resources organized by category.

    Tag

    Discover offensive security resources related to a specific tag.

    Submit

    Submit and promote your security resources.

    Recent

    Latest resources

    The newest offensive security tools, platforms, and services added to HackDB.

    image of IronPE
    Exploit DevelopmentInfrastructure SecurityRed Team Operations
    Visit Website

    IronPE

    Details

    Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.

    Internal
    image of Black Hat Ethical Hacking
    TrainingSocial EngineeringSecurity Firms
    Visit Website

    Black Hat Ethical Hacking

    Details

    Adversary simulation provider offering manual penetration testing, phishing assessments, offensive security training, and technical tool development.

    TrainingPhishing
    image of MCPScan
    AI Security
    Visit Website

    MCPScan

    Details

    Offensive auditor for MCP servers. Detects RCE, tool poisoning, credential leaks, and SSRF across stdio, HTTP, and SSE transports.

    AI
    image of Neuron
    Reporting
    Visit Website

    Neuron

    Details

    Self-hosted offensive security platform for managing engagements, findings, and delivery. Features on-prem AI reporting and real-time team collaboration.

    Report
    image of Lab401
    Wireless SecurityPhysical SecurityRed Team OperationsReverse Engineering
    Visit Website

    Lab401

    Details

    Premier hardware store for offensive security, providing Flipper Zero, Proxmark, Hak5 tools, SDR equipment, and specialized RFID cloning hardware.

    WirelessPhysicalInternal
    image of Swarmer
    Red Team OperationsInfrastructure Security
    Visit Website

    Swarmer

    Details

    Convert registry exports into NTUSER.MAN hive files to stealthily inject HKCU keys without admin rights, bypassing EDR/AV registry API monitoring.

    Internal
    Recent resources
    Featured

    Featured

    Highlighted offensive security tools, platforms, and services featured across HackDB.

    image of Vulnetic Hacking Agent
    AI SecurityExploit DevelopmentRed Team OperationsVulnerability Intelligence
    Visit Website

    Vulnetic Hacking Agent

    Details

    Vulnetic AI is a high-performance hacking agent built for serious penetration testing at a fraction of typical costs.

    APICloudExternalInternalServices+1
    image of HexStrike AI
    AI SecurityApplication SecurityBug Bounty
    Visit Website

    HexStrike AI

    Details

    AI-powered cybersecurity automation platform with 150+ tools and autonomous AI agents for pentesting, vulnerability discovery, and bug bounty automation.

    AIBug Bounty
    image of GuidedHacking
    Reverse EngineeringExploit DevelopmentApplication Security
    Visit Website

    GuidedHacking

    Details

    Guided Hacking is the #1 source for learning game hacking since 2011 producing high quality educational content on game hacking & reverse engineering.

    TrainingStatic Analysis
    image of BloodHound Community Edition
    Infrastructure Security
    Visit Website

    BloodHound Community Edition

    Details

    BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

    ReportInternal
    image of Caldera
    Red Team Operations
    Visit Website

    Caldera

    Details

    CALDERA is an automated adversary emulation system that leverages the MITRE ATT&CK framework to assess security posture and detect gaps.

    External
    image of Evilginx Pro
    Red Team OperationsSocial Engineering
    Visit Website

    Evilginx Pro

    Details

    Evilginx Pro is a phishing framework designed for red teams, enabling advanced phishing attacks with features like session hijacking and credential harvesting.

    ServicesExternalReport
    Search resources
    Category

    Explore by category

    Browse offensive security resources organized by category.

    AI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTraining
    API SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability Intelligence
    Application SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless Security
    View all categories
    Tag

    Explore by tag

    Discover offensive security resources related to a specific tag.

    internalexternalwebtrainingbug-bountyapireportaiosintwirelessstatic-analysisservicescertificationsvulnerability-intelligencecloudc2mobilephysicalphishingbruteforcedosclassification
    View all tags
    Pricing

    Submit or promote your resource

    Free and paid options for getting your security resource listed and promoted on HackDB.

    Free

    For Free Listings

    $0

     

    Reviewed and listed within 72 hours.

    Permanent listing with no backlink required.

    Shared on the HackDB X account.

    Dashboard with AI post generator for X.

    No social media or newsletter promotion.

    No featured badge.

    POPULAR

    Pro

    For Featured Listings

    $9.99

     

    Everything in Free.

    Publish now or schedule your launch.

    Featured on the homepage.

    Featured badge on your listing.

    Featured placement at the top of listings.

    Included in social media and newsletter promotion.

    Sponsor

    For Sponsored Listings

    $19.99

    / month

    Everything in Pro.

    Promote your resource on almost every page.

    One sponsored slot per period.

    Schedule your sponsor run by date range.

    Priority help with images, copy, and positioning.

    Premium customer support.

    View pricing