LogoHackDB
  • Recent
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
🎉Follow HackDB onX (Twitter)

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

icon of Vulnetic Hacking Agenticon of HexStrike AIicon of GuidedHackingicon of BloodHound Community Editionicon of Calderaicon of Evilginx Proicon of NIST NVDicon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censys
381+

381+ listings on HackDB

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of WiFi Pineapple
Wireless SecurityRed Team Operations
Visit Website

WiFi Pineapple

Details

The WiFi Pineapple Mark VII is the industry-standard WiFi pentest platform, refined and enterprise-ready for red teams.

WirelessWebC2ReportTraining+1
image of WiFiChallengeLab-docker
Wireless SecurityTraining
Visit Website

WiFiChallengeLab-docker

Details

Virtualized WiFi pentesting lab using Docker and mac80211_hwsim for practicing WiFi attacks without physical cards.

WirelessTraining
image of WiGLE
Wireless Security
Visit Website

WiGLE

Details

WiGLE is a wireless network mapping platform that aggregates data on Wi-Fi and cellular networks from user submissions and wardriving efforts.

OSINTWireless
image of WifiPumpkin3 Pro
Wireless SecurityRed Team OperationsSocial Engineering
Visit Website

WifiPumpkin3 Pro

Details

WifiPumpkin3 Pro: A professional framework for Wi-Fi security testing, rogue access point deployment, and adversarial emulation for red teams.

WirelessPhishing
image of Wifiphisher
Wireless Security
Visit Website

Wifiphisher

Details

Wifiphisher is a rogue access point framework for Wi-Fi security testing and red team engagements, enabling MITM and phishing attacks.

Wireless
image of Wifite2
Wireless Security
Visit Website

Wifite2

Details

Wifite2 is a Python script for auditing wireless networks, automating various attacks to retrieve network passwords.

Wireless
image of Wonka
Infrastructure Security
Visit Website

Wonka

Details

Wonka is a Windows tool for extracting Kerberos tickets from the Local Security Authority (LSA) cache for security research and penetration testing.

Internal
image of WuppieFuzz
API Security
Visit Website

WuppieFuzz

Details

WuppieFuzz: coverage-guided REST API fuzzer using LibAFL, easy-to-use, explainable flaws, modular, supports black/grey/white box testing.

API
image of XBOW
AI SecurityApplication SecurityVulnerability IntelligenceRed Team Operations
Visit Website

XBOW

Details

AI-powered penetration testing platform that scales offensive security, discovers vulnerabilities, and validates exploits with AI agents.

AIWebAPIVulnerability IntelligenceServices+2
image of XSStrike
Application Security
Visit Website

XSStrike

Details

XSStrike is an advanced XSS detection suite with intelligent payload generation, fuzzing engine, and fast crawler for web security.

WebBug Bounty
image of Zero Day Initiative
Vulnerability Intelligence
Visit Website

Zero Day Initiative

Details

Zero Day Initiative publishes advisories on vulnerabilities discovered by their researchers, providing details and links to vendor fixes.

Vulnerability Intelligence
image of Zero-Point Security Courses
Training
Visit Website

Zero-Point Security Courses

Details

Zero-Point Security offers specialized training courses in various cybersecurity domains, enhancing practical skills for professionals.

TrainingCertifications
  • Previous
  • 1
  • More pages
  • 27
  • 28
  • 29
  • More pages
  • 32
  • Next