LogoHackDB
  • Recent
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

icon of Vulnetic Hacking Agent
icon of HexStrike AI
icon of GuidedHacking
icon of BloodHound Community Edition
icon of Caldera
icon of Evilginx Pro
icon of NIST NVD
icon of OWASP Foundation
icon of Web Security Academy
icon of Metasploit
icon of Censys
375+

375+ listings on HackDB

image of CloudSploit
Cloud Security
Visit Website

CloudSploit

Details

CloudSploit by Aqua scans cloud infrastructure for security risks, supporting AWS, Azure, GCP, OCI, and GitHub.

Cloud
image of Cobalt
Red Team OperationsSecurity Firms
Visit Website

Cobalt

Details

Cobalt provides offensive security services with a SaaS platform, offering pentesting and vulnerability management for modern security needs.

ExternalServicesReport
image of Cobalt Strike
Red Team Operations
Visit Website

Cobalt Strike

Details

Cobalt Strike: adversary simulation tool emulating advanced threat actors in IT networks using Beacon, a post-exploitation agent.

ExternalC2Internal
image of Commix
Application Security
Visit Website

Commix

Details

Commix is an open-source penetration testing tool for detecting and exploiting command injection vulnerabilities in web applications.

Web
image of Corellium Virtual Hardware
Application Security
Visit Website

Corellium Virtual Hardware

Details

Corellium provides virtualized iOS, Android, and Arm devices for accelerated security testing, research, and DevSecOps.

MobileTrainingServicesStatic Analysis
image of Covert Instruments
Physical Security
Visit Website

Covert Instruments

Details

Covert Instruments offers best-in-class lock picks & entry tools for locksmiths, hobbyists, and security professionals to elevate skills.

Physical
image of CrackMapExec
Infrastructure Security
Visit Website

CrackMapExec

Details

CrackMapExec is a swiss army knife for pentesting Windows networks, automating common tasks for assessing security vulnerabilities.

Internal
image of CrackMy.App
Reverse Engineering
Visit Website

CrackMy.App

Details

CrackMy.App: Share crackmes, solve reverse engineering challenges, and compete on the leaderboard in this ultimate community.

Training
image of Crackmes.one
Reverse Engineering
Visit Website

Crackmes.one

Details

Crackmes.one offers a vast collection of reverse engineering challenges to help hone your binary exploitation and reverse engineering skills.

Training
image of Cutter
Reverse EngineeringExploit Development
Visit Website

Cutter

Details

Cutter is a free and open-source reverse engineering platform powered by Rizin, designed for user-friendly and advanced analysis.

Static Analysis
image of CyberChef
Reverse EngineeringApplication Security
Visit Website

CyberChef

Details

CyberChef is a web app for encryption, encoding, compression, and data analysis, offering a wide range of operations in a drag-and-drop interface.

WebMobileBug Bounty
image of DNSDumpster
Reconnaissance
Visit Website

DNSDumpster

Details

DNSDumpster is a free domain research tool for discovering hosts, DNS records, and attack surfaces related to a domain.

External
  • Previous
  • 1
  • More pages
  • 6
  • 7
  • 8
  • More pages
  • 32
  • Next

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security