LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    🎉Follow HackDB on

    The Ultimate Directory for Offensive Security

    A database for red teaming, penetration testing, and ethical hacking resources

    icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
    395+

    395+ listings on HackDB

    Newsletter

    Join the Community

    Subscribe to our newsletter for the latest news and updates

    Explore

    Offensive security resources

    Browse curated tools, platforms, and services for offensive security teams.

    Recent

    See the newest tools, platforms, and services added to HackDB.

    Category

    Browse offensive security resources organized by category.

    Tag

    Discover offensive security resources related to a specific tag.

    Submit

    Submit and promote your security resources.

    Recent

    Latest resources

    The newest offensive security tools, platforms, and services added to HackDB.

    image of Neuron
    Reporting
    Visit Website

    Neuron

    Details

    Self-hosted offensive security platform for managing engagements, findings, and delivery. Features on-prem AI reporting and real-time team collaboration.

    Report
    image of Lab401
    Wireless SecurityPhysical SecurityRed Team OperationsReverse Engineering
    Visit Website

    Lab401

    Details

    Premier hardware store for offensive security, providing Flipper Zero, Proxmark, Hak5 tools, SDR equipment, and specialized RFID cloning hardware.

    WirelessPhysicalInternal
    image of Swarmer
    Red Team OperationsInfrastructure Security
    Visit Website

    Swarmer

    Details

    Convert registry exports into NTUSER.MAN hive files to stealthily inject HKCU keys without admin rights, bypassing EDR/AV registry API monitoring.

    Internal
    image of Intruder
    Infrastructure SecurityApplication SecurityReconnaissanceReporting
    Visit Website

    Intruder

    Details

    Unified exposure management platform for automated vulnerability scanning, attack surface monitoring, and cloud security posture management.

    ExternalInternalCloudAPIWeb+2
    image of NeroSwarm Deception Lab
    Red Team OperationsInfrastructure SecurityReconnaissanceApplication Security
    Visit Website

    NeroSwarm Deception Lab

    Details

    NeroSwarm Deception Lab offers free cyber deception tools including honeytoken creation, honeypot script generation, and IP threat reputation checking.

    OSINTInternalExternal
    image of Promptfoo
    AI Security
    Visit Website

    Promptfoo

    Details

    Open-source LLM security testing framework for automated red teaming, prompt injection detection, and vulnerability scanning in AI agents and RAGs.

    AI
    Recent resources
    Featured

    Featured

    Highlighted offensive security tools, platforms, and services featured across HackDB.

    image of Vulnetic Hacking Agent
    AI SecurityExploit DevelopmentRed Team OperationsVulnerability Intelligence
    Visit Website

    Vulnetic Hacking Agent

    Details

    Vulnetic AI is a high-performance hacking agent built for serious penetration testing at a fraction of typical costs.

    APICloudExternalInternalServices+1
    image of HexStrike AI
    AI SecurityApplication SecurityBug Bounty
    Visit Website

    HexStrike AI

    Details

    AI-powered cybersecurity automation platform with 150+ tools and autonomous AI agents for pentesting, vulnerability discovery, and bug bounty automation.

    AIBug Bounty
    image of GuidedHacking
    Reverse EngineeringExploit DevelopmentApplication Security
    Visit Website

    GuidedHacking

    Details

    Guided Hacking is the #1 source for learning game hacking since 2011 producing high quality educational content on game hacking & reverse engineering.

    TrainingStatic Analysis
    image of BloodHound Community Edition
    Infrastructure Security
    Visit Website

    BloodHound Community Edition

    Details

    BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

    ReportInternal
    image of Caldera
    Red Team Operations
    Visit Website

    Caldera

    Details

    CALDERA is an automated adversary emulation system that leverages the MITRE ATT&CK framework to assess security posture and detect gaps.

    External
    image of Evilginx Pro
    Red Team OperationsSocial Engineering
    Visit Website

    Evilginx Pro

    Details

    Evilginx Pro is a phishing framework designed for red teams, enabling advanced phishing attacks with features like session hijacking and credential harvesting.

    ServicesExternalReport
    Search resources
    Category

    Explore by category

    Browse offensive security resources organized by category.

    AI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTraining
    API SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability Intelligence
    Application SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless Security
    View all categories
    Tag

    Explore by tag

    Discover offensive security resources related to a specific tag.

    internalexternalwebtrainingbug-bountyapireportaiosintwirelessstatic-analysisservicescertificationsvulnerability-intelligencecloudc2mobilephysicalphishingbruteforcedosclassification
    View all tags
    Pricing

    Submit or promote your resource

    Free and paid options for getting your security resource listed and promoted on HackDB.

    Free

    For Free Listings

    $0

     

    Reviewed and listed within 72 hours.

    Permanent listing with no backlink required.

    Shared on the HackDB X account.

    Dashboard with AI post generator for X.

    No social media or newsletter promotion.

    No featured badge.

    POPULAR

    Pro

    For Featured Listings

    $9.99

     

    Everything in Free.

    Publish now or schedule your launch.

    Featured on the homepage.

    Featured badge on your listing.

    Featured placement at the top of listings.

    Included in social media and newsletter promotion.

    Sponsor

    For Sponsored Listings

    $19.99

    / month

    Everything in Pro.

    Promote your resource on almost every page.

    One sponsored slot per period.

    Schedule your sponsor run by date range.

    Priority help with images, copy, and positioning.

    Premium customer support.

    View pricing