LogoHackDB
  • Recent
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
🎉Follow HackDB onX (Twitter)

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
381+

381+ listings on HackDB

image of TaskHound
ReconnaissanceRed Team OperationsInfrastructure Security
Visit Website

TaskHound

Details

A tool to enumerate privileged Scheduled Tasks on Remote Windows Systems, aiding in identifying potential attack paths.

Internal
image of Telespotter
Reconnaissance
Visit Website

Telespotter

Details

Telespotter is a RUST-based OSINT tool for phone number reconnaissance, leveraging multiple search engines and people lookup sites.

OSINT
image of Tenable
Security FirmsReportingApplication SecurityInfrastructure Security
Visit Website

Tenable

Details

Tenable's exposure management platform helps organizations find, prioritize, and fix cyber risks across IT, cloud, OT, and identity environments.

APIReportWebServicesExternal+3
image of Terra Security
AI SecurityApplication SecurityAPI SecurityVulnerability IntelligenceRed Team OperationsReportingCloud Security
Visit Website

Terra Security

Details

Agentic AI-powered continuous penetration testing as a service (PTaaS) platform that combines AI scale with human supervision.

AIAPIWebReportCloud+3
image of Threat Dragon
Application Security
Visit Website

Threat Dragon

Details

OWASP Threat Dragon is a free, open-source threat modeling tool for creating threat model diagrams and listing threats.

Static Analysis
image of Titus
Application SecurityAPI Security
Visit Website

Titus

Details

Titus is a high-performance secrets scanner that detects credentials, API keys, and tokens in source code, files, and git history with 459 detection rules and live credential validation.

Static AnalysisAPIWebMobileExternal
image of Truffle Security
Application SecurityCloud Security
Visit Website

Truffle Security

Details

Truffle Security provides open-source and enterprise solutions for detecting and remediating leaked keys and credentials across the SDLC.

WebBug BountyCloud
image of TryHackMe
Training
Visit Website

TryHackMe

Details

TryHackMe is an online platform that teaches cyber security through hands-on labs and virtual machines.

TrainingWebCertifications
image of USB-WiFi
Wireless Security
Visit Website

USB-WiFi

Details

A GitHub repository providing USB WiFi adapter information for Linux, focusing on compatibility and recommendations for Kali Linux users.

Wireless
image of Unleashed Firmware
Wireless Security
Visit Website

Unleashed Firmware

Details

Custom firmware for Flipper Zero with added features, improved components, and full API compatibility for experimental purposes.

Wireless
image of VIPER
Red Team Operations
Visit Website

VIPER

Details

VIPER is a powerful and flexible red team platform designed for adversary emulation and red team operations across various platforms.

InternalExternalReport
image of VirusTotal
Reverse Engineering
Visit Website

VirusTotal

Details

VirusTotal is a free online service that analyzes files, URLs, domains, and IPs for malicious content using a vast array of antivirus engines and threat intelligence feeds.

Static Analysis
  • Previous
  • 1
  • More pages
  • 25
  • 26
  • 27
  • More pages
  • 32
  • Next

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security