LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Hack The Box
TrainingCertifications
Visit Website

Hack The Box

Details

Hack The Box: Cybersecurity training platform for individuals and organizations, offering hands-on labs, courses, and certifications.

TrainingCertifications
image of HackTricks
Training
Visit Website

HackTricks

Details

HackTricks is a comprehensive cybersecurity knowledge base covering various hacking techniques, tools, and methodologies for offensive and defensive security.

Training
image of HackerOne
Certifications
Visit Website

HackerOne

Details

HackerOne is a security platform that combines human expertise and AI to identify and address vulnerabilities in software.

Bug Bounty
image of Hacksplaining
Training
Visit Website

Hacksplaining

Details

Hacksplaining offers interactive security training for developers, covering common web vulnerabilities through engaging lessons and hands-on practice.

Training
image of Hak5
Wireless SecurityPhysical SecuritySocial Engineering
Visit Website

Hak5

Details

Hak5 offers industry-leading hacker tools, training, and resources for pentesters, cybersecurity professionals, and IT experts.

TrainingPhysicalWireless
image of Have I Been Pwned
ReconnaissanceSocial Engineering
Visit Website

Have I Been Pwned

Details

Have I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.

External
image of Havoc
Red Team Operations
Visit Website

Havoc

Details

Havoc is a modern, malleable post-exploitation C2 framework with sleep obfuscation, return address spoofing, and indirect syscalls.

InternalExternalC2
image of Holehe
ReconnaissanceSocial Engineering
Visit Website

Holehe

Details

Holehe is an OSINT tool to discover accounts linked to an email across 120+ sites using password recovery & registration methods.

External
image of Hunter.io
ReconnaissanceSocial Engineering
Visit Website

Hunter.io

Details

Hunter.io is an email outreach platform to find and verify professional email addresses and send cold emails to connect with leads.

External
image of Huntr
AI SecurityBug Bounty
Visit Website

Huntr

Details

Huntr is the first bug bounty platform focused on AI and ML security, rewarding researchers for finding vulnerabilities in open-source and model-related software.

Bug BountyAI
image of ICopyX
Physical SecurityRed Team Operations
Visit Website

ICopyX

Details

The iCopy-X is a portable RFID cloning tool for pentesters, security researchers, locksmiths, and hobbyists, simplifying RFID tag duplication.

WirelessPhysical
image of IDA Pro
Reverse EngineeringExploit Development
Visit Website

IDA Pro

Details

IDA Pro: The ultimate multi-platform, multi-processor reverse engineering and malware analysis tool with a powerful disassembler and debugger.

Static Analysis
  • Previous
  • 1
  • More pages
  • 10
  • 11
  • 12
  • More pages
  • 27
  • Next