LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Seek Thermal
Physical Security
Visit Website

Seek Thermal

Details

Seek Thermal offers thermal imaging tools ideal for physical pentesters and red teamers to assess building security and detect hidden activity.

Physical
image of Sherlock
ReconnaissanceSocial EngineeringBug Bounty
Visit Website

Sherlock

Details

Sherlock is an OSINT tool for finding usernames across social networks to support digital investigations and reconnaissance.

Bug BountyOSINT
image of Shodan
Reconnaissance
Visit Website

Shodan

Details

Shodan is a search engine for Internet-connected devices, enabling users to discover and monitor exposed services and gain Internet intelligence.

APIWebExternal
image of Sliver
Red Team Operations
Visit Website

Sliver

Details

Sliver is a cross-platform, general-purpose implant framework written in Golang, designed as an open-source alternative to Cobalt Strike.

ExternalInternalC2
image of Sn1per
ReconnaissanceRed Team Operations
Visit Website

Sn1per

Details

Sn1per is an Attack Surface Management (ASM) platform designed to automate vulnerability scanning and information gathering.

External
image of Snaffler
Red Team OperationsReconnaissanceInfrastructure Security
Visit Website

Snaffler

Details

Snaffler is a pentesting tool to find credentials and sensitive data in Windows/AD environments by enumerating file shares and content.

Internal
image of Snyk
Application Security
Visit Website

Snyk

Details

Snyk is a developer-first security platform that finds and fixes vulnerabilities in code, dependencies, containers, and infrastructure as code.

Web
image of Snyk Vulnerability Database
Vulnerability Intelligence
Visit Website

Snyk Vulnerability Database

Details

Comprehensive vulnerability database with timely open-source intel and cloud misconfiguration details for developers and security teams.

Vulnerability Intelligence
image of Social Analyzer
ReconnaissanceSocial Engineering
Visit Website

Social Analyzer

Details

Social Analyzer: API, CLI, and Web App for analyzing and finding a person's profile across 1000+ social media websites.

External
image of SouthOrd
Physical Security
Visit Website

SouthOrd

Details

SouthOrd offers high-quality locksmith tools and lock picking supplies for professionals, hobbyists, and security experts.

Physical
image of SpecterOps
Security Firms
Visit Website

SpecterOps

Details

SpecterOps offers cybersecurity solutions and training to defend against adversary tactics, including tradecraft analysis and attack path management.

Services
image of SpiderFoot
ReconnaissanceRed Team OperationsInfrastructure Security
Visit Website

SpiderFoot

Details

SpiderFoot automates OSINT for threat intelligence and attack surface mapping, integrating diverse data sources for comprehensive analysis.

External
  • Previous
  • 1
  • More pages
  • 16
  • 17
  • 18
  • More pages
  • 22
  • Next