LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of Osmedeus
    ReconnaissanceApplication Security
    Visit Website

    Osmedeus

    Details

    Osmedeus is a workflow engine for offensive security, designed to build customizable reconnaissance systems for large-scale targets.

    Bug BountyWeb
    • Previous
    • 1
    • More pages
    • 19
    • 20
    • 21
    • More pages
    • 33
    • Next
    image of PE-bear
    Reverse Engineering
    Visit Website

    PE-bear

    Details

    PE-bear: A multiplatform reversing tool for PE files, offering a fast and flexible first view for malware analysis.

    Static Analysis
    image of PNPT
    CertificationsTraining
    Visit Website

    PNPT

    Details

    The PNPT certification validates network penetration testing skills through a practical exam, report writing, and live debrief.

    CertificationsTraining
    image of Packet Storm
    Vulnerability Intelligence
    Visit Website

    Packet Storm

    Details

    Packet Storm Security is a comprehensive resource for cybersecurity professionals, offering a vast archive of exploits, advisories, tools, and news.

    Vulnerability Intelligence
    image of Pacu
    Cloud Security
    Visit Website

    Pacu

    Details

    Pacu is an AWS exploitation framework for offensive security testing of Amazon Web Services environments.

    Cloud
    image of PasswordPusher
    Reporting
    Visit Website

    PasswordPusher

    Details

    Securely share sensitive information with automatic expiration & deletion, audit logs, and encrypted storage. Host your own instance.

    Report
    image of Payloads All The Things
    Application Security
    Visit Website

    Payloads All The Things

    Details

    A comprehensive collection of payloads and bypasses for web application security testing and exploitation.

    WebBug BountyAPIExternal
    image of PeTeReport
    Reporting
    Visit Website

    PeTeReport

    Details

    PeTeReport is an open-source pentest reporting tool designed to assist pentesting/redteaming efforts by simplifying report generation.

    Report
    image of Phishing Club
    Social EngineeringRed Team Operations
    Visit Website

    Phishing Club

    Details

    Phishing Club is a phishing simulation and man-in-the-middle framework designed for companies and red teams to obtain initial access.

    Phishing
    image of Physical Exploitation Store
    Physical Security
    Visit Website

    Physical Exploitation Store

    Details

    Red team tools: RFID skimmers, decoy readers, and physical exploitation hardware for security professionals and adversarial testing.

    Physical
    image of Pillar Security
    AI SecurityInfrastructure Security
    Visit Website

    Pillar Security

    Details

    Pillar Security: AI security platform to identify, assess, and mitigate security risks across the entire AI lifecycle.

    AI
    image of PlexTrac
    Reporting
    Visit Website

    PlexTrac

    Details

    PlexTrac is an AI-powered platform for pentest reporting, vulnerability management, and continuous threat exposure management (CTEM).

    Report