LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of OWASP Gen AI Security Project
AI Security
Visit Website

OWASP Gen AI Security Project

Details

OWASP Gen AI Security Project provides resources, risk strategies, and global collaboration to secure LLMs, AI agents, and generative AI technologies.

AITraining
image of OWASP Juice Shop
Training
Visit Website

OWASP Juice Shop

Details

OWASP Juice Shop is a deliberately insecure web application for security training, CTFs, and demonstrating security tools.

Training
image of OWASP ML Security Top 10
AI Security
Visit Website

OWASP ML Security Top 10

Details

OWASP Machine Learning Security Top 10 (2023) identifies the top 10 security risks for machine learning systems, focusing on developers and security experts.

AIReport
image of OWASP Top 10 for LLM
AI Security
Visit Website

OWASP Top 10 for LLM

Details

OWASP Top 10 for LLM Applications 2025 highlights key security risks in AI applications, focusing on vulnerabilities and countermeasures.

AI
image of OWASP Top 10 for LLM
AI Security
Visit Website

OWASP Top 10 for LLM

Details

OWASP Top 10 for Large Language Model Applications educates on security risks in deploying and managing LLMs and Generative AI applications.

AIReport
image of OWASP Web Security Testing Guide
Application SecurityTraining
Visit Website

OWASP Web Security Testing Guide

Details

A comprehensive guide to testing the security of web applications and web services, providing a framework of best practices.

WebTraining
image of OnionC2
Red Team Operations
Visit Website

OnionC2

Details

OnionC2: C2 framework with Tor integration for secure, anonymous command and control. Rust & Go powered, cross-platform, and user-friendly.

C2
image of Open Bug Bounty
Bug Bounty
Visit Website

Open Bug Bounty

Details

Open Bug Bounty: A free platform for coordinated vulnerability disclosure and bug bounty programs, connecting security researchers and website owners.

Bug Bounty
image of Osintly
ReportingInfrastructure SecurityPhysical Security
Visit Website

Osintly

Details

Osintly is an OSINT (Open Source Intelligence) platform designed to empower your searches with precision and accuracy. Unlock the world’s information using our advanced OSINT tools and techniques.

OSINTExternalReportStatic AnalysisWeb+1
image of Osmedeus
ReconnaissanceApplication Security
Visit Website

Osmedeus

Details

Osmedeus is a workflow engine for offensive security, designed to build customizable reconnaissance systems for large-scale targets.

Bug BountyWeb
image of PE-bear
Reverse Engineering
Visit Website

PE-bear

Details

PE-bear: A multiplatform reversing tool for PE files, offering a fast and flexible first view for malware analysis.

Static Analysis
image of PNPT
CertificationsTraining
Visit Website

PNPT

Details

The PNPT certification validates network penetration testing skills through a practical exam, report writing, and live debrief.

CertificationsTraining
  • Previous
  • 1
  • More pages
  • 15
  • 16
  • 17
  • More pages
  • 26
  • Next