LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Access Tools
Physical Security
Visit Website

Access Tools

Details

Access Tools provides lockout and entry tools that are essential for red teamers and physical pentesters simulating real-world breaches and social engineering attacks.

Physical
image of AdaptixC2
Red Team Operations
Visit Website

AdaptixC2

Details

Adaptix is an extensible post-exploitation framework with a cross-platform GUI client, encrypted comms, and plugin-based extenders.

C2
image of Aircrack-ng
Wireless Security
Visit Website

Aircrack-ng

Details

Aircrack-ng is a complete suite of tools to assess WiFi network security, focusing on monitoring, attacking, testing, and cracking.

Wireless
image of Airgeddon
Wireless Security
Visit Website

Airgeddon

Details

Airgeddon is a multi-use bash script for auditing wireless networks, offering various attack and testing methods for Linux systems.

Wireless
image of Altair GraphQL Client
API Security
Visit Website

Altair GraphQL Client

Details

Altair GraphQL Client is a feature-rich IDE for debugging GraphQL queries and implementations across all platforms, simplifying development workflows.

API
image of Arjun
API SecurityReconnaissanceApplication Security
Visit Website

Arjun

Details

Arjun is an HTTP parameter discovery suite to find valid web parameters and uncover hidden endpoints.

APIWeb
image of Astra Security
Application SecuritySecurity Firms
Visit Website

Astra Security

Details

Astra Security is an AI-powered pentest platform offering continuous vulnerability scanning and management for web apps, APIs, and cloud.

Report
image of AttackForge
Reporting
Visit Website

AttackForge

Details

AttackForge is a pentest management and reporting platform that streamlines penetration testing workflows and enhances collaboration across security projects.

Report
image of AttackerKB
Vulnerability Intelligence
Visit Website

AttackerKB

Details

AttackerKB is a community-driven platform by Rapid7 that provides in-depth analyses and assessments of vulnerabilities, helping security professionals prioritize threats effectively.​

Vulnerability Intelligence
image of AutoRecon
ReconnaissanceInfrastructure Security
Visit Website

AutoRecon

Details

AutoRecon is a network reconnaissance tool that automates service enumeration and port scanning for multiple targets.

Internal
image of AzureHound
Cloud SecurityInfrastructure SecurityReconnaissance
Visit Website

AzureHound

Details

AzureHound is a BloodHound data collector for Microsoft Azure, enabling security professionals to map attack paths in Azure environments.

Cloud
image of BBOT
ReconnaissanceRed Team Operations
Visit Website

BBOT

Details

BBOT is a recursive internet scanner for hackers, automating recon, bug bounties, and ASM with a suite of offensive web modules.

Bug BountyWebExternal
  • Previous
  • 1
  • 2
  • 3
  • More pages
  • 25
  • 26
  • Next