LogoHackDB
  • Recent
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
🎉Follow HackDB onX (Twitter)

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
381+

381+ listings on HackDB

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

image of RunSybil
AI SecurityVulnerability IntelligenceRed Team OperationsApplication SecurityAPI Security
Visit Website

RunSybil

Details

AI-driven pentesting platform automating hacker intuition to find vulnerabilities before exploits, reducing discovery costs.

AIVulnerability IntelligenceReportAPIWeb+4
image of RustScan
ReconnaissanceInfrastructure Security
Visit Website

RustScan

Details

RustScan: lightning-fast port scanner automating Nmap integration with adaptive learning for efficient network reconnaissance and security audits.

External
image of S3Scanner
Cloud SecurityReconnaissanceInfrastructure Security
Visit Website

S3Scanner

Details

S3Scanner finds misconfigured S3 buckets across various cloud providers, enhancing cloud security posture and data leak prevention.

Bug BountyWebCloud
image of SILPH
Red Team Operations
Visit Website

SILPH

Details

Stealthy In-Memory Local Password Harvester (SILPH) dumps LSA secrets, SAM hashes, and DCC2 credentials without writing to disk.

C2Internal
image of SPARROWS Lock Picks
Physical Security
Visit Website

SPARROWS Lock Picks

Details

Sparrows Lock Picks offers quality lock picks, covert entry tools, beginner sets, practice locks, and tutorials for lock picking success.

Physical
image of Salt Security
API SecurityAI SecurityCloud SecurityApplication Security
Visit Website

Salt Security

Details

AI-infused API Security solution for the entire API lifecycle, from discovery and posture management to threat protection, including AI Agents.

APIAICloudVulnerability IntelligenceReport+2
image of Schemathesis
API Security
Visit Website

Schemathesis

Details

Schemathesis is a tool that automatically generates API tests from OpenAPI and GraphQL schemas to find bugs.

APIStatic Analysis
image of ScoutSuite
Cloud Security
Visit Website

ScoutSuite

Details

ScoutSuite: Multi-cloud security auditing tool for AWS, Azure, and GCP. Gathers configuration data and highlights risk areas.

Cloud
image of SecCheckmate
AI SecurityCloud SecurityApplication SecurityAPI SecurityWireless SecurityInfrastructure SecurityReporting
Visit Website

SecCheckmate

Details

Offline security checklist & report generator with 200+ tests across web, cloud, WiFi, firmware, and AI security domains.

ReportAICloudWebAPI+3
image of SecLists
Application SecurityCloud SecurityInfrastructure SecurityRed Team Operations
Visit Website

SecLists

Details

SecLists is a collection of multiple types of lists used during security assessments, collected in one place for easy access.

Bug BountyWebExternalInternal
image of Security Reproter
Reporting
Visit Website

Security Reporter

Details

Security Reporter is the all-in-one pentest reporting workspace designed to optimize the entire cybersecurity assessment workflow, from testing to reporting.

ReportAPI
image of SecurityTrails
Bug BountyReconnaissance
Visit Website

SecurityTrails

Details

SecurityTrails is a threat intelligence platform that provides comprehensive data on internet assets, aiding organizations in monitoring and securing their digital footprint.​

Bug BountyOSINT
  • Previous
  • 1
  • More pages
  • 22
  • 23
  • 24
  • More pages
  • 32
  • Next
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security