LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    🎉Follow HackDB on

    The Ultimate Directory for Offensive Security

    A database for red teaming, penetration testing, and ethical hacking resources

    icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
    399+

    399+ listings on HackDB

    Newsletter

    Join the Community

    Subscribe to our newsletter for the latest news and updates

    Explore

    Offensive security resources

    Browse curated tools, platforms, and services for offensive security teams.

    Recent

    See the newest tools, platforms, and services added to HackDB.

    Category

    Browse offensive security resources organized by category.

    Tag

    Discover offensive security resources related to a specific tag.

    Submit

    Submit and promote your security resources.

    Recent

    Latest resources

    The newest offensive security tools, platforms, and services added to HackDB.

    image of PentAGI
    AI SecurityApplication SecurityInfrastructure SecurityReconnaissance
    Visit Website

    PentAGI

    Details

    Autonomous AI agent system for complex penetration testing, integrating security tools, long-term memory, and smart task delegation in sandboxed Docker.

    AIOSINTWebInternalExternal
    image of IronPE
    Exploit DevelopmentInfrastructure SecurityRed Team Operations
    Visit Website

    IronPE

    Details

    Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.

    Internal
    image of Black Hat Ethical Hacking
    TrainingSocial EngineeringSecurity Firms
    Visit Website

    Black Hat Ethical Hacking

    Details

    Adversary simulation provider offering manual penetration testing, phishing assessments, offensive security training, and technical tool development.

    TrainingPhishing
    image of MCPScan
    AI Security
    Visit Website

    MCPScan

    Details

    Offensive auditor for MCP servers. Detects RCE, tool poisoning, credential leaks, and SSRF across stdio, HTTP, and SSE transports.

    AI
    image of Neuron
    Reporting
    Visit Website

    Neuron

    Details

    Self-hosted offensive security platform for managing engagements, findings, and delivery. Features on-prem AI reporting and real-time team collaboration.

    Report
    image of Lab401
    Wireless SecurityPhysical SecurityRed Team OperationsReverse Engineering
    Visit Website

    Lab401

    Details

    Premier hardware store for offensive security, providing Flipper Zero, Proxmark, Hak5 tools, SDR equipment, and specialized RFID cloning hardware.

    WirelessPhysicalInternal
    Recent resources
    Featured

    Featured

    Highlighted offensive security tools, platforms, and services featured across HackDB.

    image of Vulnetic Hacking Agent
    AI SecurityExploit DevelopmentRed Team OperationsVulnerability Intelligence
    Visit Website

    Vulnetic Hacking Agent

    Details

    Vulnetic AI is a high-performance hacking agent built for serious penetration testing at a fraction of typical costs.

    APICloudExternalInternalServices+1
    image of HexStrike AI
    AI SecurityApplication SecurityBug Bounty
    Visit Website

    HexStrike AI

    Details

    AI-powered cybersecurity automation platform with 150+ tools and autonomous AI agents for pentesting, vulnerability discovery, and bug bounty automation.

    AIBug Bounty
    image of GuidedHacking
    Reverse EngineeringExploit DevelopmentApplication Security
    Visit Website

    GuidedHacking

    Details

    Guided Hacking is the #1 source for learning game hacking since 2011 producing high quality educational content on game hacking & reverse engineering.

    TrainingStatic Analysis
    image of BloodHound Community Edition
    Infrastructure Security
    Visit Website

    BloodHound Community Edition

    Details

    BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

    ReportInternal
    image of Caldera
    Red Team Operations
    Visit Website

    Caldera

    Details

    CALDERA is an automated adversary emulation system that leverages the MITRE ATT&CK framework to assess security posture and detect gaps.

    External
    image of Evilginx Pro
    Red Team OperationsSocial Engineering
    Visit Website

    Evilginx Pro

    Details

    Evilginx Pro is a phishing framework designed for red teams, enabling advanced phishing attacks with features like session hijacking and credential harvesting.

    ServicesExternalReport
    Search resources
    Category

    Explore by category

    Browse offensive security resources organized by category.

    AI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTraining
    API SecurityCertificationsInfrastructure Security
    Application SecurityCloud SecurityPhysical Security
    View all categories
    Tag

    Explore by tag

    Discover offensive security resources related to a specific tag.

    internalexternalwebtrainingbug-bountyapireportaiosintwirelessstatic-analysisservicescertificationsvulnerability-intelligencecloudc2mobilephysicalphishingbruteforcedosclassification
    View all tags
    Pricing

    Submit or promote your resource

    Free and paid options for getting your security resource listed and promoted on HackDB.

    Free

    For Free Listings

    $0

     

    Submit your listing today

    Reviewed and listed within 72 hours.

    Shared on the HackDB X account.

    Dashboard with AI post generator for X.

    No social media or newsletter promotion.

    No featured badge.

    POPULAR

    Pro

    For Featured Listings

    $9.99

     

    Everything in Free +

    Sponsor

    For Sponsored Listings

    $19.99

    / month

    Everything in Pro +

    Promote your resource on almost every page.

    View pricing
    Red Team Operations
    Security Firms
    Vulnerability Intelligence
    API Security
    Certifications
    Infrastructure Security
    Red Team Operations
    Security Firms
    Vulnerability Intelligence
    API Security
    Certifications
    Infrastructure Security
    Red Team Operations
    Security Firms
    Vulnerability Intelligence
    API Security
    Certifications
    Infrastructure Security
    Red Team Operations
    Security Firms
    Vulnerability Intelligence
    Reporting
    Social Engineering
    Wireless Security
    Application Security
    Cloud Security
    Physical Security
    Reporting
    Social Engineering
    Wireless Security
    Application Security
    Cloud Security
    Physical Security
    Reporting
    Social Engineering
    Wireless Security
    Application Security
    Cloud Security
    Physical Security
    Reporting
    Social Engineering
    Wireless Security

    Publish now or schedule your launch.

    Featured on the homepage.

    Featured badge on your listing.

    Featured placement at the top of listings.

    Included in social media and newsletter promotion.

    One sponsored slot per period.

    Schedule your sponsor run by date range.

    Priority help with images, copy, and positioning.

    Premium customer support.