LogoHackDB
  • Recent
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
🎉Follow HackDB onX (Twitter)

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
381+

381+ listings on HackDB

image of See-SURF
Application Security
Visit Website

See-SURF

Details

See-SURF is an AI-powered security tool designed to find and validate potential Server Side Request Forgery (SSRF) parameters in web applications.

Web
image of Seek Thermal
Physical Security
Visit Website

Seek Thermal

Details

Seek Thermal offers thermal imaging tools ideal for physical pentesters and red teamers to assess building security and detect hidden activity.

Physical
image of SessionHop
Red Team OperationsInfrastructure Security
Visit Website

SessionHop

Details

C# tool for hijacking Windows user sessions via the IHxHelpPaneServer COM object, enabling operators to run arbitrary files in another user's session.

InternalC2
image of SharpHound
Infrastructure Security
Visit Website

SharpHound

Details

SharpHound is the data collector for BloodHound, used to map and analyze Active Directory environments for privilege escalation and attack paths.

Internal
image of Sherlock
ReconnaissanceSocial EngineeringBug Bounty
Visit Website

Sherlock

Details

Sherlock is an OSINT tool for finding usernames across social networks to support digital investigations and reconnaissance.

Bug BountyOSINT
image of ShipSec Studio
Application SecurityInfrastructure SecurityReconnaissance
Visit Website

ShipSec Studio

Details

ShipSec Studio is an open-source security workflow orchestration platform designed for building, executing, and monitoring automated security workflows at scale.

AIOSINTExternal
image of Shodan
Reconnaissance
Visit Website

Shodan

Details

Shodan is a search engine for Internet-connected devices, enabling users to discover and monitor exposed services and gain Internet intelligence.

APIWebExternal
image of SigmaPotato
Infrastructure Security
Visit Website

SigmaPotato

Details

SigmaPotato: SeImpersonate privilege escalation tool for Windows 8-11 & Server 2012-2022 with PowerShell & .NET reflection support.

Internal
image of SilentButDeadly
Red Team OperationsInfrastructure Security
Visit Website

SilentButDeadly

Details

A network communication blocker designed to neutralize EDR/AV software using Windows Filtering Platform (WFP).

Internal
image of Sliver
Red Team Operations
Visit Website

Sliver

Details

Sliver is a cross-platform, general-purpose implant framework written in Golang, designed as an open-source alternative to Cobalt Strike.

ExternalInternalC2
image of Sn1per
ReconnaissanceRed Team Operations
Visit Website

Sn1per

Details

Sn1per is an Attack Surface Management (ASM) platform designed to automate vulnerability scanning and information gathering.

External
image of Snaffler
Red Team OperationsReconnaissanceInfrastructure Security
Visit Website

Snaffler

Details

Snaffler is a pentesting tool to find credentials and sensitive data in Windows/AD environments by enumerating file shares and content.

Internal
  • Previous
  • 1
  • More pages
  • 23
  • 24
  • 25
  • More pages
  • 32
  • Next

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security