LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of Akto
    API Security
    Visit Website

    Akto

    Details

    Akto is an API security platform providing API discovery, security posture assessment, and testing throughout the DevSecOps pipeline.

    APIWebStatic AnalysisReportTraining
    • Previous
    • 1
    • 2
    • 3
    • More pages
    • 32
    • 33
    • Next
    image of BloodHound Community Edition
    Infrastructure Security
    Visit Website

    BloodHound Community Edition

    Details

    BloodHound CE maps attack paths in Active Directory, Entra ID, and Azure, using graph theory to reveal hidden relationships and vulnerabilities.

    ReportInternal
    image of Caldera
    Red Team Operations
    Visit Website

    Caldera

    Details

    CALDERA is an automated adversary emulation system that leverages the MITRE ATT&CK framework to assess security posture and detect gaps.

    External
    image of Censys
    Reconnaissance
    Visit Website

    Censys

    Details

    Censys provides attack surface management and threat hunting solutions powered by comprehensive internet intelligence data.

    WebExternal
    image of Evilginx Pro
    Red Team OperationsSocial Engineering
    Visit Website

    Evilginx Pro

    Details

    Evilginx Pro is a phishing framework designed for red teams, enabling advanced phishing attacks with features like session hijacking and credential harvesting.

    ServicesExternalReport
    image of GuidedHacking
    Reverse EngineeringExploit DevelopmentApplication Security
    Visit Website

    GuidedHacking

    Details

    Guided Hacking is the #1 source for learning game hacking since 2011 producing high quality educational content on game hacking & reverse engineering.

    TrainingStatic Analysis
    image of HexStrike AI
    AI SecurityApplication SecurityBug Bounty
    Visit Website

    HexStrike AI

    Details

    AI-powered cybersecurity automation platform with 150+ tools and autonomous AI agents for pentesting, vulnerability discovery, and bug bounty automation.

    AIBug Bounty
    image of Metasploit
    Infrastructure Security
    Visit Website

    Metasploit

    Details

    Metasploit is a penetration testing framework that helps security teams verify vulnerabilities, manage assessments, and improve security awareness.

    WebExternalServices
    image of NIST NVD
    ReportingVulnerability Intelligence
    Visit Website

    NIST NVD

    Details

    The NVD is the U.S. government repository of standards-based vulnerability management data, enabling red teams to analyze CVEs and assess security risks.

    ReportClassificationVulnerability Intelligence
    image of OWASP Foundation
    Application Security
    Visit Website

    OWASP Foundation

    Details

    OWASP Foundation: Open source application security, providing resources, tools, and community for secure software development.

    WebAPIMobileTrainingCertifications+1
    image of OffSec
    TrainingCertifications
    Visit Website

    OffSec

    Details

    OffSec delivers cyber workforce resilience through skills development, hands-on learning platform, and a comprehensive library.

    TrainingCertifications
    image of PortSwigger
    Application Security
    Visit Website

    PortSwigger

    Details

    PortSwigger offers web application security tools, testing resources, and training to identify the latest vulnerabilities.

    WebAPIMobile