LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Packet Storm
Vulnerability Intelligence
Visit Website

Packet Storm

Details

Packet Storm Security is a comprehensive resource for cybersecurity professionals, offering a vast archive of exploits, advisories, tools, and news.

Vulnerability Intelligence
image of Pacu
Cloud Security
Visit Website

Pacu

Details

Pacu is an AWS exploitation framework for offensive security testing of Amazon Web Services environments.

Cloud
image of PasswordPusher
Reporting
Visit Website

PasswordPusher

Details

Securely share sensitive information with automatic expiration & deletion, audit logs, and encrypted storage. Host your own instance.

Report
image of Payloads All The Things
Application Security
Visit Website

Payloads All The Things

Details

A comprehensive collection of payloads and bypasses for web application security testing and exploitation.

WebBug BountyAPIExternal
image of PeTeReport
Reporting
Visit Website

PeTeReport

Details

PeTeReport is an open-source pentest reporting tool designed to assist pentesting/redteaming efforts by simplifying report generation.

Report
image of Physical Exploitation Store
Physical Security
Visit Website

Physical Exploitation Store

Details

Red team tools: RFID skimmers, decoy readers, and physical exploitation hardware for security professionals and adversarial testing.

Physical
image of Pillar Security
AI SecurityInfrastructure Security
Visit Website

Pillar Security

Details

Pillar Security: AI security platform to identify, assess, and mitigate security risks across the entire AI lifecycle.

AI
image of PlexTrac
Reporting
Visit Website

PlexTrac

Details

PlexTrac is an AI-powered platform for pentest reporting, vulnerability management, and continuous threat exposure management (CTEM).

Report
image of PlumHound
ReportingInfrastructure Security
Visit Website

PlumHound

Details

BloodHound reporting tool for Blue and Purple Teams to identify Active Directory security vulnerabilities.

Report
image of Porch Pirate
API SecurityReconnaissance
Visit Website

Porch Pirate

Details

A Postman recon/OSINT framework for automated API endpoint discovery and secret exploitation in workspaces, collections, requests, users, and teams.

OSINTAPIBug Bounty
image of Postman
Application SecurityAPI Security
Visit Website

Postman

Details

Postman: The leading API platform for building and using APIs. Streamline collaboration and simplify the API lifecycle.

APIWebMobile
image of Praetorian
Security Firms
Visit Website

Praetorian

Details

Praetorian offers continuous threat exposure management solutions, including attack surface management and breach & attack simulation.

Services
  • Previous
  • 1
  • More pages
  • 18
  • 19
  • 20
  • More pages
  • 31
  • Next