LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of Aircrack-ng
Wireless Security
Visit Website

Aircrack-ng

Details

Aircrack-ng is a complete suite of tools to assess WiFi network security, focusing on monitoring, attacking, testing, and cracking.

Wireless
image of Airgeddon
Wireless Security
Visit Website

Airgeddon

Details

Airgeddon is a multi-use bash script for auditing wireless networks, offering various attack and testing methods for Linux systems.

Wireless
image of Altair GraphQL Client
API Security
Visit Website

Altair GraphQL Client

Details

Altair GraphQL Client is a feature-rich IDE for debugging GraphQL queries and implementations across all platforms, simplifying development workflows.

API
image of Arjun
API SecurityReconnaissanceApplication Security
Visit Website

Arjun

Details

Arjun is an HTTP parameter discovery suite to find valid web parameters and uncover hidden endpoints.

APIWeb
image of AttackForge
Reporting
Visit Website

AttackForge

Details

AttackForge is a pentest management and reporting platform that streamlines penetration testing workflows and enhances collaboration across security projects.

Report
image of AttackerKB
Vulnerability Intelligence
Visit Website

AttackerKB

Details

AttackerKB is a community-driven platform by Rapid7 that provides in-depth analyses and assessments of vulnerabilities, helping security professionals prioritize threats effectively.​

Vulnerability Intelligence
image of AzureHound
Cloud SecurityInfrastructure SecurityReconnaissance
Visit Website

AzureHound

Details

AzureHound is a BloodHound data collector for Microsoft Azure, enabling security professionals to map attack paths in Azure environments.

Cloud
image of BBOT
ReconnaissanceRed Team Operations
Visit Website

BBOT

Details

BBOT is a recursive internet scanner for hackers, automating recon, bug bounties, and ASM with a suite of offensive web modules.

Bug BountyWebExternal
image of BC Security
Red Team Operations
Visit Website

BC Security

Details

BC Security provides cybersecurity assessments and training, offering technical expertise and compliance knowledge for today's business world.

Internal
image of BYOB
Reverse EngineeringExploit DevelopmentRed Team Operations
Visit Website

BYOB

Details

BYOB is an open-source post-exploitation framework for students, researchers, and developers to build and manage botnets.

C2
image of Binary Ninja
Reverse Engineering
Visit Website

Binary Ninja

Details

Binary Ninja is a reverse engineering platform with a scriptable decompiler, disassembler, and debugger for analyzing binaries.

Static AnalysisMobileWeb
image of Bishop Fox
Security Firms
Visit Website

Bishop Fox

Details

Bishop Fox is a leading offensive security firm providing continuous pen testing, red teaming, and attack surface management solutions.

Services
  • Previous
  • 1
  • 2
  • 3
  • More pages
  • 22
  • 23
  • Next