Submit your favorite resources for free.

Submit
LogoHackDB
  • Recent
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Category

    Explore by category

    Browse offensive security resources organized by category.

    Open AI Securityicon of Vulnetic Hacking Agenticon of HexStrike AIicon of SplxAIicon of Lakera PINT Benchmarkicon of Giskardicon of PentAGI
    43+

    AI Security

    43 apps

    AI security focuses on attacking LLMs and agents via prompt injection, model extraction, RAG poisoning, tool abuse, and breaking trust boundaries.

    Open category
    Open API Securityicon of Aktoicon of Titusicon of Webhook.siteicon of SecCheckmateicon of Moxyicon of Salt Security
    32+

    API Security

    32 apps

    API security covers attacking and securing modern REST, GraphQL, and gRPC endpoints via IDOR, BOLA, JWT flaws, and rate-limiting bypass techniques.

    Open category
    Open Application Securityicon of HexStrike AIicon of GuidedHackingicon of OWASP Foundationicon of Web Security Academyicon of PortSwiggericon of PentAGI
    79+

    Application Security

    79 apps

    Application security focuses on identifying and mitigating vulnerabilities in software, including input validation, authentication, and access control.

    Open category
    Open Bug Bountyicon of HexStrike AIicon of DLLHijackHuntericon of Nervaicon of bboticon of urlessicon of subwiz
    27+

    Bug Bounty

    27 apps

    Bug bounty focuses on platforms, writeups, and tools for ethical hackers participating in vulnerability disclosure programs via recon and reporting tasks.

    Open category
    Open Certificationsicon of OffSecicon of DeepLearning.AIicon of HackerOneicon of APIsec Universityicon of OSEPicon of OSWE
    21+

    Certifications

    21 apps

    This category covers professional cybersecurity certifications that validate offensive security skills, red teaming, and practical penetration testing.

    Open category
    Open Cloud Securityicon of SecCheckmateicon of Salt Securityicon of Aikidoicon of Terra Securityicon of Pwned Labsicon of CloudGoat
    24+

    Cloud Security

    24 apps

    Cloud security focuses on identifying misconfigurations and vulnerabilities within platforms like AWS, Azure, and GCP via IAM abuse and enumeration tools.

    Open category
    Open Exploit Developmenticon of Vulnetic Hacking Agenticon of GuidedHackingicon of IronPEicon of KittySploit Frameworkicon of yetAnotherObfuscatoricon of InvisibilityCloak
    26+

    Exploit Development

    26 apps

    Exploit development covers crafting custom exploits for vulnerabilities in software, including shellcode, fuzzing, ROP chains, and memory corruption.

    Open category
    Open Infrastructure Securityicon of BloodHound Community Editionicon of Metasploiticon of PentAGIicon of IronPEicon of Swarmericon of Intruder
    85+

    Infrastructure Security

    85 apps

    Infrastructure security covers internal and external network assessments, including port scanning, service enumeration, and Active Directory attacks.

    Open category
    Open Physical Securityicon of Lab401icon of Red Team Toolsicon of Physical Exploitation Storeicon of Osintlyicon of EvilCrowRF-V2icon of Access Tools
    15+

    Physical Security

    15 apps

    Physical security addresses real-world attack vectors like badge cloning, RFID attacks, keyloggers, and lockpicking for onsite security assessments.

    Open category
    Open Reconnaissanceicon of GeoEvidenticon of Censysicon of PentAGIicon of Intrudericon of NeroSwarm Deception Labicon of Nerva
    80+

    Reconnaissance

    80 apps

    Reconnaissance covers gathering information through passive and active techniques like subdomain enumeration, asset discovery, and ASN/IP lookup tools.

    Open category
    Open Red Team Operationsicon of Vulnetic Hacking Agenticon of Calderaicon of Evilginx Proicon of IronPEicon of Lab401icon of Swarmer
    78+

    Red Team Operations

    78 apps

    Red team operations simulate real-world adversaries using C2 frameworks, OPSEC-aware tooling, payload generation, and stealthy post-exploitation methods.

    Open category
    Open Reportingicon of GeoEvidenticon of NIST NVDicon of Reconmapicon of Neuronicon of Intrudericon of SecCheckmate
    31+

    Reporting

    31 apps

    Reporting includes tools and templates for professional documentation of findings, including PDF generators, Markdown builders, and pentest frameworks.

    Open category
    Open Reverse Engineeringicon of GuidedHackingicon of Lab401icon of PE-bearicon of BYOBicon of mingw-w64icon of Crackmes.one
    24+

    Reverse Engineering

    24 apps

    Reverse engineering focuses on analyzing binaries and software to discover vulnerabilities or dissect malware via disassembly and debugging environments.

    Open category
    Open Security Firmsicon of Black Hat Ethical Hackingicon of Astra Securityicon of NowSecureicon of Red Buttonicon of RedWolf Securityicon of NCC Group
    14+

    Security Firms

    14 apps

    Security firms list companies offering offensive services like pentesting, red teaming, and social engineering to simulate real-world security attacks.

    Open category
    Open Social Engineeringicon of GeoEvidenticon of Evilginx Proicon of Black Hat Ethical Hackingicon of BITBicon of Phishing Clubicon of GeoSpy
    22+

    Social Engineering

    22 apps

    Social engineering covers tactics used to manipulate individuals into revealing info. Includes phishing, pretexting, vishing, and human target testing.

    Open category
    Open Trainingicon of Web Security Academyicon of OffSecicon of GOADicon of Black Hat Ethical Hackingicon of DeepLearning.AIicon of Zero-Point Security Courses
    37+

    Training

    37 apps

    Training features hands-on labs, self-paced platforms, and structured paths for learning exploit techniques, tool usage, and offensive methodology.

    Open category
    Open Vulnerability Intelligenceicon of Vulnetic Hacking Agenticon of NIST NVDicon of Xygeni Securityicon of IPinfoicon of Aikidoicon of Terra Security
    21+

    Vulnerability Intelligence

    21 apps

    Curated databases, exploit indexes, and analytical resources for tracking vulnerabilities. Includes CVE feeds, PoC repositories, and prioritization tools.

    Open category
    Open Wireless Securityicon of Lab401icon of hostapicon of SecCheckmateicon of USB-WiFiicon of EAP_bustericon of Freeway
    29+

    Wireless Security

    29 apps

    Wireless security covers attacks against Wi-Fi, Bluetooth, and RF protocols. This includes sniffing, injection, rogue AP setups, and WPA cracking tools.

    Open category