LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Tenable
Security FirmsReportingApplication SecurityInfrastructure Security
Visit Website

Tenable

Details

Tenable's exposure management platform helps organizations find, prioritize, and fix cyber risks across IT, cloud, OT, and identity environments.

APIReportWebServicesExternal+3
image of Threat Dragon
Application Security
Visit Website

Threat Dragon

Details

OWASP Threat Dragon is a free, open-source threat modeling tool for creating threat model diagrams and listing threats.

Static Analysis
image of Truffle Security
Application SecurityCloud Security
Visit Website

Truffle Security

Details

Truffle Security provides open-source and enterprise solutions for detecting and remediating leaked keys and credentials across the SDLC.

WebBug BountyCloud
image of TryHackMe
Training
Visit Website

TryHackMe

Details

TryHackMe is an online platform that teaches cyber security through hands-on labs and virtual machines.

TrainingWebCertifications
image of USB-WiFi
Wireless Security
Visit Website

USB-WiFi

Details

A GitHub repository providing USB WiFi adapter information for Linux, focusing on compatibility and recommendations for Kali Linux users.

Wireless
image of Unleashed Firmware
Wireless Security
Visit Website

Unleashed Firmware

Details

Custom firmware for Flipper Zero with added features, improved components, and full API compatibility for experimental purposes.

Wireless
image of VIPER
Red Team Operations
Visit Website

VIPER

Details

VIPER is a powerful and flexible red team platform designed for adversary emulation and red team operations across various platforms.

InternalExternalReport
image of VirusTotal
Reverse Engineering
Visit Website

VirusTotal

Details

VirusTotal is a free online service that analyzes files, URLs, domains, and IPs for malicious content using a vast array of antivirus engines and threat intelligence feeds.

Static Analysis
Screenshot of Voyage
Reconnaissance
Visit Website

Voyage

Details

Voyage is a Rust-based subdomain enumeration tool with active/passive methods, SQLite progress tracking, and a real-time terminal UI.

Bug BountyWebExternal
image of VulDB
Vulnerability Intelligence
Visit Website

VulDB

Details

VulDB is a comprehensive vulnerability management and threat intelligence platform, documenting and analyzing security vulnerabilities since 1970.

Vulnerability Intelligence
image of Vulners
Vulnerability Intelligence
Visit Website

Vulners

Details

Vulners.com: A comprehensive vulnerability database enriched with CVEs, exploits, articles, and tools for proactive cybersecurity management.

Vulnerability Intelligence
image of Vulnetic.ai
Reporting
Visit Website

Vulnetic.ai

Details

Vulnetic.ai offers an autonomous AI pentesting agent that emulates a mid‑career penetration tester to identify vulnerabilities and produce compliance‑ready reports.

ReportClassification
  • Previous
  • 1
  • More pages
  • 23
  • 24
  • 25
  • More pages
  • 29
  • Next