LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
image of Synack
Security FirmsBug Bounty
Visit Website

Synack

Details

Synack offers a security testing platform combining elite researchers with technology for continuous vulnerability discovery and risk management.

ServicesBug Bounty
image of SysReptor
Reporting
Visit Website

SysReptor

Details

SysReptor is a pentest report creator that simplifies report customization, writing, rendering, and platform operation for security professionals.

Report
image of TCM Security
TrainingCertificationsSecurity Firms
Visit Website

TCM Security

Details

TCM Security offers cybersecurity consulting, penetration testing, auditing, and training services to secure data, systems, and networks.

TrainingCertificationsServices
image of THC-Hydra
Infrastructure SecurityReconnaissanceReverse Engineering
Visit Website

THC-Hydra

Details

THC-Hydra is a fast network login cracker supporting numerous protocols; a valuable tool for security researchers and consultants.

Bruteforce
image of TaskHound
ReconnaissanceRed Team OperationsInfrastructure Security
Visit Website

TaskHound

Details

A tool to enumerate privileged Scheduled Tasks on Remote Windows Systems, aiding in identifying potential attack paths.

Internal
image of Tenable
Security FirmsReportingApplication SecurityInfrastructure Security
Visit Website

Tenable

Details

Tenable's exposure management platform helps organizations find, prioritize, and fix cyber risks across IT, cloud, OT, and identity environments.

APIReportWebServicesExternal+3
image of Threat Dragon
Application Security
Visit Website

Threat Dragon

Details

OWASP Threat Dragon is a free, open-source threat modeling tool for creating threat model diagrams and listing threats.

Static Analysis
image of Truffle Security
Application SecurityCloud Security
Visit Website

Truffle Security

Details

Truffle Security provides open-source and enterprise solutions for detecting and remediating leaked keys and credentials across the SDLC.

WebBug BountyCloud
image of TryHackMe
Training
Visit Website

TryHackMe

Details

TryHackMe is an online platform that teaches cyber security through hands-on labs and virtual machines.

TrainingWebCertifications
image of USB-WiFi
Wireless Security
Visit Website

USB-WiFi

Details

A GitHub repository providing USB WiFi adapter information for Linux, focusing on compatibility and recommendations for Kali Linux users.

Wireless
image of Unleashed Firmware
Wireless Security
Visit Website

Unleashed Firmware

Details

Custom firmware for Flipper Zero with added features, improved components, and full API compatibility for experimental purposes.

Wireless
image of VIPER
Red Team Operations
Visit Website

VIPER

Details

VIPER is a powerful and flexible red team platform designed for adversary emulation and red team operations across various platforms.

InternalExternalReport
  • Previous
  • 1
  • More pages
  • 23
  • 24
  • 25
  • More pages
  • 30
  • Next