LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

The Ultimate Directory for Offensive Security

A database for red teaming, penetration testing, and ethical hacking resources

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company2
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
  • All Categories

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of DeHashed
Reconnaissance
Visit Website

DeHashed

Details

DeHashed is a powerful search engine for compromised credentials and breach data used in threat intelligence and reconnaissance.

External
image of DeepLearning.AI
TrainingCertifications
Visit Website

DeepLearning.AI

Details

Offers online AI courses and certifications by Andrew Ng, helping individuals and organizations build AI skills and stay ahead in the industry.

Training
image of DefectDojo
Reporting
Visit Website

DefectDojo

Details

DefectDojo automates application security vulnerability management, unifying security tools and streamlining DevSecOps workflows.

Report
image of Dradis Community Edition
Reporting
Visit Website

Dradis Community Edition

Details

Dradis CE is an open-source reporting and collaboration tool for InfoSec professionals to streamline security project reporting for free.

Report
image of Dradis Pro
Reporting
Visit Website

Dradis Pro

Details

Dradis Pro streamlines pentesting with collaboration, automation, and consistent reporting, trusted by security teams worldwide.

ReportWebInternalServicesExternal
image of DragonOS
Wireless Security
Visit Website

DragonOS

Details

DragonOS is an out-of-the-box operating system tailored for software-defined radios (SDRs), available for Raspberry Pi and x86-64 architectures.

Wireless
image of Dryrun Security
Application Security
Visit Website

Dryrun Security

Details

AI-powered security agents that detect logic flaws, authorization gaps, and IDOR, preventing code risks in modern applications.

Static Analysis
image of EAPHammer
Wireless SecurityRed Team Operations
Visit Website

EAPHammer

Details

EAPHammer: Evil twin attacks against WPA2-Enterprise networks with hostile portal attacks and indirect wireless pivots.

Wireless
image of EAP_buster
Wireless Security
Visit Website

EAP_buster

Details

EAP_buster lists supported EAP methods of a RADIUS server, aiding red teams and detecting rogue WPA-Enterprise access points.

Wireless
image of EC-Council
TrainingCertifications
Visit Website

EC-Council

Details

EC-Council offers cybersecurity courses online, providing industry-recognized certifications and training for career advancement.

TrainingCertificationsWebInternalServices+1
image of Empire
Red Team Operations
Visit Website

Empire

Details

Empire is a post-exploitation framework for red teams and penetration testers, featuring encrypted comms and a modular design.

InternalExternalC2
image of EnforsterAI
AI SecurityApplication SecurityAPI SecurityCloud SecurityVulnerability Intelligence
Visit Website

EnforsterAI

Details

AI-native SAST tool for code security, detecting vulnerabilities, secrets, IaC issues, and AI model security with actionable AI fixes.

AIStatic AnalysisAPICloudWeb+1
  • Previous
  • 1
  • More pages
  • 7
  • 8
  • 9
  • More pages
  • 31
  • Next