LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Steampipe
Cloud SecurityInfrastructure Security
Visit Website

Steampipe

Details

Steampipe: Query your cloud, code, logs & more with SQL. Build benchmarks & dashboards for security & insights. Zero-ETL from 140+ sources.

ExternalInternal
image of Subfinder
Bug BountyReconnaissance
Visit Website

Subfinder

Details

Subfinder is a fast passive subdomain enumeration tool for websites, leveraging online sources to discover valid subdomains.

Bug BountyOSINT
image of Synack
Security FirmsBug Bounty
Visit Website

Synack

Details

Synack offers a security testing platform combining elite researchers with technology for continuous vulnerability discovery and risk management.

ServicesBug Bounty
image of SysReptor
Reporting
Visit Website

SysReptor

Details

SysReptor is a pentest report creator that simplifies report customization, writing, rendering, and platform operation for security professionals.

Report
image of TCM Security
TrainingCertificationsSecurity Firms
Visit Website

TCM Security

Details

TCM Security offers cybersecurity consulting, penetration testing, auditing, and training services to secure data, systems, and networks.

TrainingCertificationsServices
image of THC-Hydra
Infrastructure SecurityReconnaissanceReverse Engineering
Visit Website

THC-Hydra

Details

THC-Hydra is a fast network login cracker supporting numerous protocols; a valuable tool for security researchers and consultants.

Bruteforce
image of Tenable
Security FirmsReportingApplication SecurityInfrastructure Security
Visit Website

Tenable

Details

Tenable's exposure management platform helps organizations find, prioritize, and fix cyber risks across IT, cloud, OT, and identity environments.

APIReportWebServicesExternal+3
image of Truffle Security
Application SecurityCloud Security
Visit Website

Truffle Security

Details

Truffle Security provides open-source and enterprise solutions for detecting and remediating leaked keys and credentials across the SDLC.

WebBug BountyCloud
image of TryHackMe
Training
Visit Website

TryHackMe

Details

TryHackMe is an online platform that teaches cyber security through hands-on labs and virtual machines.

TrainingWebCertifications
image of Unleashed Firmware
Wireless Security
Visit Website

Unleashed Firmware

Details

Custom firmware for Flipper Zero with added features, improved components, and full API compatibility for experimental purposes.

Wireless
image of VIPER
Red Team Operations
Visit Website

VIPER

Details

VIPER is a powerful and flexible red team platform designed for adversary emulation and red team operations across various platforms.

InternalExternalReport
image of VirusTotal
Reverse Engineering
Visit Website

VirusTotal

Details

VirusTotal is a free online service that analyzes files, URLs, domains, and IPs for malicious content using a vast array of antivirus engines and threat intelligence feeds.

Static Analysis
  • Previous
  • 1
  • More pages
  • 17
  • 18
  • 19
  • More pages
  • 22
  • Next