LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of BBOT
ReconnaissanceRed Team Operations
Visit Website

BBOT

Details

BBOT is a recursive internet scanner for hackers, automating recon, bug bounties, and ASM with a suite of offensive web modules.

Bug BountyWebExternal
image of BC Security
Red Team Operations
Visit Website

BC Security

Details

BC Security provides cybersecurity assessments and training, offering technical expertise and compliance knowledge for today's business world.

Internal
image of BYOB
Reverse EngineeringExploit DevelopmentRed Team Operations
Visit Website

BYOB

Details

BYOB is an open-source post-exploitation framework for students, researchers, and developers to build and manage botnets.

C2
image of Binary Ninja
Reverse Engineering
Visit Website

Binary Ninja

Details

Binary Ninja is a reverse engineering platform with a scriptable decompiler, disassembler, and debugger for analyzing binaries.

Static AnalysisMobileWeb
image of Bishop Fox
Security Firms
Visit Website

Bishop Fox

Details

Bishop Fox is a leading offensive security firm providing continuous pen testing, red teaming, and attack surface management solutions.

Services
image of BloodHound Query Library
Infrastructure Security
Visit Website

BloodHound Query Library

Details

BloodHound Query Library appears to be a resource for pre-built queries designed for use with BloodHound, a tool for analyzing Active Directory environments.

Internal
image of Brute Ratel C4
Red Team Operations
Visit Website

Brute Ratel C4

Details

Brute Ratel C4 is a customized command and control center designed for red team and adversary simulation, offering advanced evasion techniques.

ExternalC2Internal
image of BugBountyHunter
Bug BountyTraining
Visit Website

BugBountyHunter

Details

BugBountyHunter.com offers training and resources for aspiring bug bounty hunters, focusing on web application vulnerabilities and practical skills.

TrainingBug Bounty
image of Bugcrowd
Bug Bounty
Visit Website

Bugcrowd

Details

Bugcrowd is a crowdsourced cybersecurity platform offering bug bounty, pen testing, & vulnerability disclosure programs to reduce risk.

Bug Bounty
image of CIS Top 18
Reporting
Visit Website

CIS Top 18

Details

The CIS Controls are a prioritized set of actions to help organizations improve their cybersecurity posture and protect against common threats.

ClassificationReport
image of CPTS
CertificationsTraining
Visit Website

CPTS

Details

The HTB Certified Penetration Testing Specialist (CPTS) certification validates practical penetration testing skills and knowledge.

CertificationsTraining
image of CREST CPSA
CertificationsTraining
Visit Website

CREST CPSA

Details

CREST Practitioner Security Analyst (CPSA) is an entry-level certification assessing skills in operating systems and network services.

CertificationsTraining
  • Previous
  • 1
  • More pages
  • 3
  • 4
  • 5
  • More pages
  • 26
  • Next