LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of CIS Top 18
Reporting
Visit Website

CIS Top 18

Details

The CIS Controls are a prioritized set of actions to help organizations improve their cybersecurity posture and protect against common threats.

ClassificationReport
image of CPTS
CertificationsTraining
Visit Website

CPTS

Details

The HTB Certified Penetration Testing Specialist (CPTS) certification validates practical penetration testing skills and knowledge.

CertificationsTraining
image of CREST CPSA
CertificationsTraining
Visit Website

CREST CPSA

Details

CREST Practitioner Security Analyst (CPSA) is an entry-level certification assessing skills in operating systems and network services.

CertificationsTraining
image of CREST CRT
CertificationsTraining
Visit Website

CREST CRT

Details

The CREST Registered Penetration Tester (CRT) exam validates skills in assessing networks, systems, and web applications.

CertificationsTraining
image of CTFd
Training
Visit Website

CTFd

Details

CTFd is a Capture The Flag framework for cybersecurity training, developer skill enhancement, and student education, offering easy CTF event creation.

Training
image of CVEDetails
Vulnerability Intelligence
Visit Website

CVEDetails

Details

CVEDetails.com is a comprehensive CVE database offering enhanced vulnerability intelligence, including advisories, exploits, tools, and more, to aid security professionals in threat assessment and mitigation.

Vulnerability Intelligence
image of CWE Common Weakness Enumeration
ReportingApplication Security
Visit Website

CWE Common Weakness Enumeration

Details

A comprehensive community-developed list of common software and hardware weaknesses to help identify and mitigate security issues.

ReportWeb
image of CXSECURITY.COM
Vulnerability Intelligence
Visit Website

CXSECURITY.COM

Details

CXSECURITY.COM provides independent security information, a vast collection of data communication safety insights, and vulnerability details.

Vulnerability Intelligence
image of CanIPhish
TrainingSocial Engineering
Visit Website

CanIPhish

Details

CanIPhish is a platform for simulated phishing and security awareness training, offering realistic simulations and integrated eLearning.

TrainingWebServicesExternalReport
image of Canarytokens
Infrastructure SecurityRed Team OperationsReporting
Visit Website

Canarytokens

Details

Canarytokens is a free tool to plant traps in your network that notify you when triggered, helping you detect breaches early.

Phishing
image of Cellbusters
Physical SecurityWireless Security
Visit Website

Cellbusters

Details

Cellbusters develops RF detection and signal locating tech to guard against security threats in prisons, government, casinos, and more.

WirelessPhysical
image of Certipy
Infrastructure Security
Visit Website

Certipy

Details

Certipy is a toolkit for enumerating and abusing Active Directory Certificate Services (AD CS) with ESC1-ESC16 attack path support.

Internal
  • Previous
  • 1
  • More pages
  • 4
  • 5
  • 6
  • More pages
  • 30
  • Next