LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of SPARROWS Lock Picks
    Physical Security
    Visit Website

    SPARROWS Lock Picks

    Details

    Sparrows Lock Picks offers quality lock picks, covert entry tools, beginner sets, practice locks, and tutorials for lock picking success.

    Physical
    • Previous
    • 1
    • More pages
    • 23
    • 24
    • 25
    • More pages
    • 33
    • Next
    image of Salt Security
    API SecurityAI SecurityCloud SecurityApplication Security
    Visit Website

    Salt Security

    Details

    AI-infused API Security solution for the entire API lifecycle, from discovery and posture management to threat protection, including AI Agents.

    APIAICloudVulnerability IntelligenceReport+2
    image of Schemathesis
    API Security
    Visit Website

    Schemathesis

    Details

    Schemathesis is a tool that automatically generates API tests from OpenAPI and GraphQL schemas to find bugs.

    APIStatic Analysis
    image of ScoutSuite
    Cloud Security
    Visit Website

    ScoutSuite

    Details

    ScoutSuite: Multi-cloud security auditing tool for AWS, Azure, and GCP. Gathers configuration data and highlights risk areas.

    Cloud
    image of SecCheckmate
    AI SecurityCloud SecurityApplication SecurityAPI SecurityWireless SecurityInfrastructure SecurityReporting
    Visit Website

    SecCheckmate

    Details

    Offline security checklist & report generator with 200+ tests across web, cloud, WiFi, firmware, and AI security domains.

    ReportAICloudWebAPI+3
    image of SecLists
    Application SecurityCloud SecurityInfrastructure SecurityRed Team Operations
    Visit Website

    SecLists

    Details

    SecLists is a collection of multiple types of lists used during security assessments, collected in one place for easy access.

    Bug BountyWebExternalInternal
    image of Security Reproter
    Reporting
    Visit Website

    Security Reporter

    Details

    Security Reporter is the all-in-one pentest reporting workspace designed to optimize the entire cybersecurity assessment workflow, from testing to reporting.

    ReportAPI
    image of SecurityTrails
    Bug BountyReconnaissance
    Visit Website

    SecurityTrails

    Details

    SecurityTrails provides a massive repository of historical DNS data and IP address records to help security teams track domain changes and attack surfaces.

    Bug BountyOSINT
    image of See-SURF
    Application Security
    Visit Website

    See-SURF

    Details

    See-SURF is an AI-powered security tool designed to find and validate potential Server Side Request Forgery (SSRF) parameters in web applications.

    Web
    image of Seek Thermal
    Physical Security
    Visit Website

    Seek Thermal

    Details

    Seek Thermal offers thermal imaging tools ideal for physical pentesters and red teamers to assess building security and detect hidden activity.

    Physical
    image of SessionHop
    Red Team OperationsInfrastructure Security
    Visit Website

    SessionHop

    Details

    C# tool for hijacking Windows user sessions via the IHxHelpPaneServer COM object, enabling operators to run arbitrary files in another user's session.

    InternalC2
    image of SharpHound
    Infrastructure Security
    Visit Website

    SharpHound

    Details

    SharpHound is the data collector for BloodHound, used to map and analyze Active Directory environments for privilege escalation and attack paths.

    Internal