LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of GraphQL Voyager
    API Security
    Visit Website

    GraphQL Voyager

    Details

    GraphQL Voyager: Visualize any GraphQL API as an interactive graph, aiding in understanding and exploration of its schema and relationships.

    API
    • Previous
    • 1
    • More pages
    • 11
    • 12
    • 13
    • More pages
    • 33
    • Next
    image of GraphQLmap
    API SecurityApplication Security
    Visit Website

    GraphQLmap

    Details

    GraphQLmap is a scripting engine for GraphQL endpoint pentesting, automating queries and fuzzing for vulnerabilities.

    API
    image of Grep by Vercel
    Application SecurityReconnaissance
    Visit Website

    Grep by Vercel

    Details

    Grep is a code search tool by Vercel that allows users to search code, files, and paths across a million public GitHub repositories.

    OSINT
    image of GreyNoise
    ReconnaissanceVulnerability Intelligence
    Visit Website

    GreyNoise

    Details

    GreyNoise Visualizer helps security professionals investigate internet noise and uncover real-time vulnerability exploitation trends.

    OSINTVulnerability Intelligence
    image of HORIZON3.ai
    Infrastructure SecurityApplication SecurityRed Team Operations
    Visit Website

    HORIZON3.ai

    Details

    Horizon3.ai provides autonomous pentesting via NodeZero, allowing red teams to find exploitable attack paths and verify security fixes in real-time.

    InternalExternalServices
    image of HTB Certified Bug Bounty Hunter
    Certifications
    Visit Website

    HTB Certified Bug Bounty Hunter

    Details

    The HTB Certified Bug Bounty Hunter certification validates skills in identifying and exploiting web application vulnerabilities.

    Bug Bounty
    image of Hack The Box
    TrainingCertifications
    Visit Website

    Hack The Box

    Details

    Hack The Box: Cybersecurity training platform for individuals and organizations, offering hands-on labs, courses, and certifications.

    TrainingCertifications
    image of HackDB
    Training
    Visit Website

    HackDB

    Details

    HackDB is the ultimate directory for offensive security, providing a curated database of resources for red teaming, penetration testing, and ethical hacking.

    Training
    image of HackTricks
    Training
    Visit Website

    HackTricks

    Details

    HackTricks is a comprehensive cybersecurity knowledge base covering various hacking techniques, tools, and methodologies for offensive and defensive security.

    Training
    image of HackerOne
    Certifications
    Visit Website

    HackerOne

    Details

    HackerOne is a security platform that combines human expertise and AI to identify and address vulnerabilities in software.

    Bug Bounty
    image of Hacksplaining
    Training
    Visit Website

    Hacksplaining

    Details

    Hacksplaining offers interactive security training for developers, covering common web vulnerabilities through engaging lessons and hands-on practice.

    Training
    image of Hak5
    Wireless SecurityPhysical SecuritySocial Engineering
    Visit Website

    Hak5

    Details

    Hak5 offers industry-leading hacker tools, training, and resources for pentesters, cybersecurity professionals, and IT experts.

    TrainingPhysicalWireless