LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    🎉Follow HackDB on

    The Ultimate Directory for Offensive Security

    A database for red teaming, penetration testing, and ethical hacking resources

    icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
    402+

    402+ listings on HackDB

    Newsletter

    Join the Community

    Subscribe to our newsletter for the latest news and updates

    Explore

    Offensive security resources

    Browse curated tools, platforms, and services for offensive security teams.

    Recent

    See the newest tools, platforms, and services added to HackDB.

    Category

    Browse offensive security resources organized by category.

    Tag

    Discover offensive security resources related to a specific tag.

    Submit

    Submit and promote your security resources.

    Recent

    Latest resources

    The newest offensive security tools, platforms, and services added to HackDB.

    image of GOAD
    Red Team OperationsInfrastructure Security
    Visit Website

    GOAD

    Details

    An automated, highly vulnerable Active Directory lab for practicing advanced internal penetration testing and red team attack techniques.

    Internal
    image of Lakera PINT Benchmark
    AI Security
    Visit Website

    Lakera PINT Benchmark

    Details

    Neutral benchmark for evaluating prompt injection detection systems across 4,300+ inputs including jailbreaks and adversarial prompting.

    AI
    image of Giskard
    AI Security
    Visit Website

    Giskard

    Details

    Automated testing platform to secure LLM agents against prompt injection, data leaks, and hallucinations through continuous adversarial red teaming.

    AI
    image of PentAGI
    AI SecurityApplication SecurityInfrastructure SecurityReconnaissance
    Visit Website

    PentAGI

    Details

    Autonomous AI agent system for complex penetration testing, integrating security tools, long-term memory, and smart task delegation in sandboxed Docker.

    AIOSINTWebInternalExternal
    image of IronPE
    Exploit DevelopmentInfrastructure SecurityRed Team Operations
    Visit Website

    IronPE

    Details

    Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.

    Internal
    image of Black Hat Ethical Hacking
    TrainingSocial EngineeringSecurity Firms
    Visit Website

    Black Hat Ethical Hacking

    Details

    Adversary simulation provider offering manual penetration testing, phishing assessments, offensive security training, and technical tool development.

    TrainingPhishing
    Recent resources
    Featured

    Featured

    Highlighted offensive security tools, platforms, and services featured across HackDB.

    image of Vulnetic Hacking Agent
    AI SecurityExploit DevelopmentRed Team OperationsVulnerability Intelligence
    Visit Website

    Vulnetic Hacking Agent

    Details

    Vulnetic AI is a high-performance hacking agent built for serious penetration testing at a fraction of typical costs.

    APICloudExternalInternalServices+1
    image of HexStrike AI
    AI SecurityApplication SecurityBug Bounty
    Visit Website

    HexStrike AI

    Details

    AI-powered cybersecurity automation platform with 150+ tools and autonomous AI agents for pentesting, vulnerability discovery, and bug bounty automation.

    AIBug Bounty
    image of GuidedHacking
    Reverse EngineeringExploit DevelopmentApplication Security
    Visit Website

    GuidedHacking

    Details

    Guided Hacking is the #1 source for learning game hacking since 2011 producing high quality educational content on game hacking & reverse engineering.

    TrainingStatic Analysis
    image of BloodHound Community Edition
    Infrastructure Security
    Visit Website

    BloodHound Community Edition

    Details

    BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

    ReportInternal
    image of Caldera
    Red Team Operations
    Visit Website

    Caldera

    Details

    CALDERA is an automated adversary emulation system that leverages the MITRE ATT&CK framework to assess security posture and detect gaps.

    External
    image of Evilginx Pro
    Red Team OperationsSocial Engineering
    Visit Website

    Evilginx Pro

    Details

    Evilginx Pro is a phishing framework designed for red teams, enabling advanced phishing attacks with features like session hijacking and credential harvesting.

    ServicesExternalReport
    Search resources
    Category

    Explore by category

    Browse offensive security resources organized by category.

    AI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTraining
    API SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability Intelligence
    Application SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless Security
    View all categories
    Tag

    Explore by tag

    Discover offensive security resources related to a specific tag.

    internalexternalwebtrainingbug-bountyapiaireportosintwirelessstatic-analysisservicescertificationsvulnerability-intelligencecloudc2mobilephysicalphishingbruteforcedosclassification
    View all tags
    Pricing

    Submit or promote your resource

    Free and paid options for getting your security resource listed and promoted on HackDB.

    Free

    For Free Listings

    $0

     

    Submit your listing today

    Reviewed and listed within 72 hours.

    Shared on the HackDB X account.

    Dashboard with AI post generator for X.

    No social media or newsletter promotion.

    No featured badge.

    POPULAR

    Pro

    For Featured Listings

    $9.99

     

    Everything in Free +

    Publish now or schedule your launch.

    Featured on the homepage.

    Featured badge on your listing.

    Featured placement at the top of listings.

    Included in social media and newsletter promotion.

    Sponsor

    For Sponsored Listings

    $19.99

    / month

    Everything in Pro +

    Promote your resource on almost every page.

    One sponsored slot per period.

    Schedule your sponsor run by date range.

    Priority help with images, copy, and positioning.

    Premium customer support.

    View pricing