LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of CanIPhish
TrainingSocial Engineering
Visit Website

CanIPhish

Details

CanIPhish is a platform for simulated phishing and security awareness training, offering realistic simulations and integrated eLearning.

TrainingWebServicesExternalReport
image of Canarytokens
Infrastructure SecurityRed Team OperationsReporting
Visit Website

Canarytokens

Details

Canarytokens is a free tool to plant traps in your network that notify you when triggered, helping you detect breaches early.

Phishing
image of Cellbusters
Physical SecurityWireless Security
Visit Website

Cellbusters

Details

Cellbusters develops RF detection and signal locating tech to guard against security threats in prisons, government, casinos, and more.

WirelessPhysical
image of Certipy
Infrastructure Security
Visit Website

Certipy

Details

Certipy is a toolkit for enumerating and abusing Active Directory Certificate Services (AD CS) with ESC1-ESC16 attack path support.

Internal
image of Chisel
Infrastructure Security
Visit Website

Chisel

Details

Chisel: A fast TCP/UDP tunnel over HTTP, secured via SSH. Useful for firewalls, providing secure network endpoints.

Internal
image of ChromeAlone
Red Team OperationsExploit Development
Visit Website

ChromeAlone

Details

ChromeAlone transforms Chromium browsers into C2 implants, enabling covert operations with session stealing, credential capture, and remote execution.

C2Internal
image of Ciphey
Reverse Engineering
Visit Website

Ciphey

Details

Ciphey is an automated decryption, decoding, and cracking tool that uses NLP and AI to decipher encryptions without knowing the key or cipher.

ExternalBruteforce
image of CloudFox
Cloud SecurityInfrastructure Security
Visit Website

CloudFox

Details

CloudFox helps penetration testers find exploitable attack paths in cloud infrastructure, currently supporting AWS with more on the way.

Cloud
image of CloudGoat
Cloud SecurityTraining
Visit Website

CloudGoat

Details

CloudGoat is a "Vulnerable by Design" AWS deployment tool for honing cloud cybersecurity skills through CTF-style scenarios.

TrainingCloud
image of CloudQuery
Cloud SecurityInfrastructure Security
Visit Website

CloudQuery

Details

CloudQuery provides a developer-first cloud governance platform for security, compliance, and cost visibility across multi-cloud environments.

ReportCloud
image of CloudSploit
Cloud Security
Visit Website

CloudSploit

Details

CloudSploit by Aqua scans cloud infrastructure for security risks, supporting AWS, Azure, GCP, OCI, and GitHub.

Cloud
image of Cobalt
Red Team OperationsSecurity Firms
Visit Website

Cobalt

Details

Cobalt provides offensive security services with a SaaS platform, offering pentesting and vulnerability management for modern security needs.

ExternalServicesReport
  • Previous
  • 1
  • More pages
  • 5
  • 6
  • 7
  • More pages
  • 31
  • Next