LogoHackDB
  • Search
  • Category
  • Tag
  • Pricing
  • Submit
LogoHackDB

Category

Explore by categories

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Product
  • Search
  • Category
  • Tag
Resources
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2025 All Rights Reserved.
  • All

  • AI Security

  • API Security

  • Application Security

  • Bug Bounty

  • Certifications

  • Cloud Security

  • Exploit Development

  • Infrastructure Security

  • Physical Security

  • Reconnaissance

  • Red Team Operations

  • Reporting

  • Reverse Engineering

  • Security Firms

  • Social Engineering

  • Training

  • Vulnerability Intelligence

  • Wireless Security

image of NIST NVD
ReportingVulnerability Intelligence
Visit Website

NIST NVD

Details

The National Vulnerability Database (NVD) is the U.S. government’s central repository for standardized vulnerability information. Maintained by NIST, it's a vital tool for cybersecurity risk analysis and threat management.

ReportClassificationVulnerability Intelligence
image of AttackerKB
Vulnerability Intelligence
Visit Website

AttackerKB

Details

AttackerKB is a community-driven platform by Rapid7 that provides in-depth analyses and assessments of vulnerabilities, helping security professionals prioritize threats effectively.​

Vulnerability Intelligence
image of CVEDetails
Vulnerability Intelligence
Visit Website

CVEDetails

Details

CVEDetails.com is a comprehensive CVE database offering enhanced vulnerability intelligence, including advisories, exploits, tools, and more, to aid security professionals in threat assessment and mitigation.

Vulnerability Intelligence
image of CXSECURITY.COM
Vulnerability Intelligence
Visit Website

CXSECURITY.COM

Details

CXSECURITY.COM provides independent security information, a vast collection of data communication safety insights, and vulnerability details.

Vulnerability Intelligence
image of Exploit Database
Vulnerability Intelligence
Visit Website

Exploit Database

Details

Exploit Database (Exploit-DB) is a curated repository of public exploits and proof-of-concepts for offensive and defensive security professionals.

Vulnerability Intelligence
image of Exploit.IN
Vulnerability Intelligence
Visit Website

Exploit.IN

Details

Exploit.IN delivers the latest news, research, and tools concerning hacking, exploits, vulnerabilities, malware, and cybersecurity laws.

Vulnerability Intelligence
image of GreyNoise
ReconnaissanceVulnerability Intelligence
Visit Website

GreyNoise

Details

GreyNoise Visualizer helps security professionals investigate internet noise and uncover real-time vulnerability exploitation trends.

OSINTVulnerability Intelligence
image of Known Exploited Vulnerabilities
Vulnerability Intelligence
Visit Website

Known Exploited Vulnerabilities

Details

CISA's Known Exploited Vulnerabilities (KEV) Catalog is an authoritative resource listing vulnerabilities actively exploited in the wild, aiding organizations in prioritizing remediation efforts.

Vulnerability Intelligence
image of Packet Storm
Vulnerability Intelligence
Visit Website

Packet Storm

Details

Packet Storm Security is a comprehensive resource for cybersecurity professionals, offering a vast archive of exploits, advisories, tools, and news.

Vulnerability Intelligence
image of Snyk Vulnerability Database
Vulnerability Intelligence
Visit Website

Snyk Vulnerability Database

Details

Comprehensive vulnerability database with timely open-source intel and cloud misconfiguration details for developers and security teams.

Vulnerability Intelligence
image of VulDB
Vulnerability Intelligence
Visit Website

VulDB

Details

VulDB is a comprehensive vulnerability management and threat intelligence platform, documenting and analyzing security vulnerabilities since 1970.

Vulnerability Intelligence
image of Vulners
Vulnerability Intelligence
Visit Website

Vulners

Details

Vulners.com: A comprehensive vulnerability database enriched with CVEs, exploits, articles, and tools for proactive cybersecurity management.

Vulnerability Intelligence
  • Previous
  • 1
  • 2
  • Next