LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of SysReptor
Reporting
Visit Website

SysReptor

Details

SysReptor is a pentest report creator that simplifies report customization, writing, rendering, and platform operation for security professionals.

Report
image of TCM Security
TrainingCertificationsSecurity Firms
Visit Website

TCM Security

Details

TCM Security offers cybersecurity consulting, penetration testing, auditing, and training services to secure data, systems, and networks.

TrainingCertificationsServices
image of THC-Hydra
Infrastructure SecurityReconnaissanceReverse Engineering
Visit Website

THC-Hydra

Details

THC-Hydra is a fast network login cracker supporting numerous protocols; a valuable tool for security researchers and consultants.

Bruteforce
image of Tenable
Security FirmsReportingApplication SecurityInfrastructure Security
Visit Website

Tenable

Details

Tenable's exposure management platform helps organizations find, prioritize, and fix cyber risks across IT, cloud, OT, and identity environments.

APIReportWebServicesExternal+3
image of Threat Dragon
Application Security
Visit Website

Threat Dragon

Details

OWASP Threat Dragon is a free, open-source threat modeling tool for creating threat model diagrams and listing threats.

Static Analysis
image of Truffle Security
Application SecurityCloud Security
Visit Website

Truffle Security

Details

Truffle Security provides open-source and enterprise solutions for detecting and remediating leaked keys and credentials across the SDLC.

WebBug BountyCloud
image of TryHackMe
Training
Visit Website

TryHackMe

Details

TryHackMe is an online platform that teaches cyber security through hands-on labs and virtual machines.

TrainingWebCertifications
image of Unleashed Firmware
Wireless Security
Visit Website

Unleashed Firmware

Details

Custom firmware for Flipper Zero with added features, improved components, and full API compatibility for experimental purposes.

Wireless
image of VIPER
Red Team Operations
Visit Website

VIPER

Details

VIPER is a powerful and flexible red team platform designed for adversary emulation and red team operations across various platforms.

InternalExternalReport
image of VirusTotal
Reverse Engineering
Visit Website

VirusTotal

Details

VirusTotal is a free online service that analyzes files, URLs, domains, and IPs for malicious content using a vast array of antivirus engines and threat intelligence feeds.

Static Analysis
Screenshot of Voyage
Reconnaissance
Visit Website

Voyage

Details

Voyage is a Rust-based subdomain enumeration tool with active/passive methods, SQLite progress tracking, and a real-time terminal UI.

Bug BountyWebExternal
image of VulDB
Vulnerability Intelligence
Visit Website

VulDB

Details

VulDB is a comprehensive vulnerability management and threat intelligence platform, documenting and analyzing security vulnerabilities since 1970.

Vulnerability Intelligence
  • Previous
  • 1
  • More pages
  • 21
  • 22
  • 23
  • More pages
  • 27
  • Next