LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Search
  • Category
  • Tag
  • Listing
    • Pricing
    • Submit
    Pages
    • Home
    • Sitemap
    • Support
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    🎉Follow HackDB on

    The Ultimate Directory for Offensive Security

    A database for red teaming, penetration testing, and ethical hacking resources

    icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
    391+

    391+ listings on HackDB

    Newsletter

    Join the Community

    Subscribe to our newsletter for the latest news and updates

    Explore

    Offensive security resources

    Browse curated tools, platforms, and services for offensive security teams.

    Recent

    See the newest tools, platforms, and services added to HackDB.

    Category

    Browse offensive security resources organized by category.

    Tag

    Discover offensive security resources related to a specific tag.

    Submit

    Submit and promote your security resources.

    Recent

    Latest resources

    The newest offensive security tools, platforms, and services added to HackDB.

    image of Intruder
    Infrastructure SecurityCloud SecurityApplication SecurityAPI SecurityVulnerability IntelligenceReconnaissanceReporting
    Visit Website

    Intruder

    Details

    Unified vulnerability management and attack surface monitoring platform for continuous infrastructure, web app, and cloud security testing.

    WebCloudAPIVulnerability IntelligenceExternal+3
    image of NeroSwarm Deception Lab
    Red Team OperationsInfrastructure SecurityReconnaissance
    Visit Website

    NeroSwarm Deception Lab

    Details

    NeroSwarm Deception Lab offers free cyber deception tools including honeytoken creation, honeypot script generation, and IP threat reputation checking.

    OSINTInternalExternal
    image of DLLHijackHunter
    Application SecurityBug BountyRed Team Operations
    Visit Website

    DLLHijackHunter

    Details

    DLLHijackHunter is an automated scanner that uses canary DLLs to confirm hijacking vulnerabilities, UAC bypasses, and privilege escalation on Windows.

    Bug BountyStatic AnalysisInternal
    image of Nerva
    ReconnaissanceInfrastructure SecurityRed Team OperationsBug Bounty
    Visit Website

    Nerva

    Details

    Nerva is a high-performance CLI tool for fast service fingerprinting across 120+ protocols (TCP/UDP/SCTP), built by Praetorian for network reconnaissance.

    OSINTExternalInternal
    image of TapDucky
    Red Team OperationsInfrastructure Security
    Visit Website

    TapDucky

    Details

    TapDucky turns any rooted phone into the legendary USB Rubber Ducky, enabling Android USB HID keystroke injection for authorized testing and automation.

    Internal
    image of DDoS-Ripper
    Red Team OperationsInfrastructure Security
    Visit Website

    DDoS-Ripper

    Details

    DDos Ripper is a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic.

    DoS
    Recent resources
    Featured

    Featured

    Highlighted offensive security tools, platforms, and services featured across HackDB.

    image of Vulnetic Hacking Agent
    AI SecurityExploit DevelopmentRed Team OperationsVulnerability Intelligence
    Visit Website

    Vulnetic Hacking Agent

    Details

    Vulnetic AI is a high-performance hacking agent built for serious penetration testing at a fraction of typical costs.

    APICloudExternalInternalServices+1
    image of HexStrike AI
    AI SecurityApplication SecurityBug Bounty
    Visit Website

    HexStrike AI

    Details

    AI-powered cybersecurity automation platform with 150+ tools and autonomous AI agents for pentesting, vulnerability discovery, and bug bounty automation.

    AIBug Bounty
    image of GuidedHacking
    Reverse EngineeringExploit DevelopmentApplication Security
    Visit Website

    GuidedHacking

    Details

    Guided Hacking is the #1 source for learning game hacking since 2011 producing high quality educational content on game hacking & reverse engineering.

    TrainingStatic Analysis
    image of BloodHound Community Edition
    Infrastructure Security
    Visit Website

    BloodHound Community Edition

    Details

    BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

    ReportInternal
    image of Caldera
    Red Team Operations
    Visit Website

    Caldera

    Details

    CALDERA is an automated adversary emulation system that leverages the MITRE ATT&CK framework to assess security posture and detect gaps.

    External
    image of Evilginx Pro
    Red Team OperationsSocial Engineering
    Visit Website

    Evilginx Pro

    Details

    Evilginx Pro is a phishing framework designed for red teams, enabling advanced phishing attacks with features like session hijacking and credential harvesting.

    ServicesExternalReport
    Search resources
    Category

    Explore by category

    Browse offensive security resources organized by category.

    AI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTrainingAI SecurityBug BountyExploit DevelopmentReconnaissanceReverse EngineeringTraining
    API SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability IntelligenceAPI SecurityCertificationsInfrastructure SecurityRed Team OperationsSecurity FirmsVulnerability Intelligence
    Application SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless SecurityApplication SecurityCloud SecurityPhysical SecurityReportingSocial EngineeringWireless Security
    View all categories
    Tag

    Explore by tag

    Discover offensive security resources related to a specific tag.

    internalexternalwebtrainingbug-bountyapireportaiosintwirelessstatic-analysisservicescertificationsvulnerability-intelligencecloudc2mobilephysicalphishingbruteforcedosclassification
    View all tags
    Pricing

    Submit or promote your resource

    Free and paid options for getting your security resource listed and promoted on HackDB.

    free

    For Standard Listings

    $0

     

    Reviewed and listed within 72 hours.

    Permanent listing with no backlink required.

    pro

    For Featured Listings

    $9.99

     

    Publish right away and schedule when it goes live.

    Featured on the homepage and top of listings.

    sponsor

    For Sponsored Listings

    $19.99

    / month

    Everything in Pro plan.

    Promote your resource on almost every page.

    View pricing