LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of SpecterOps
    Security Firms
    Visit Website

    SpecterOps

    Details

    SpecterOps offers cybersecurity solutions and training to defend against adversary tactics, including tradecraft analysis and attack path management.

    Services
    • Previous
    • 1
    • More pages
    • 25
    • 26
    • 27
    • More pages
    • 33
    • Next
    image of SpiderFoot
    ReconnaissanceRed Team OperationsInfrastructure Security
    Visit Website

    SpiderFoot

    Details

    SpiderFoot automates OSINT for threat intelligence and attack surface mapping, integrating diverse data sources for comprehensive analysis.

    External
    image of Steampipe
    Cloud SecurityInfrastructure Security
    Visit Website

    Steampipe

    Details

    Steampipe: Query your cloud, code, logs & more with SQL. Build benchmarks & dashboards for security & insights. Zero-ETL from 140+ sources.

    ExternalInternal
    image of Subfinder
    Bug BountyReconnaissance
    Visit Website

    Subfinder

    Details

    Subfinder is a fast passive subdomain enumeration tool for websites, leveraging online sources to discover valid subdomains.

    Bug BountyOSINT
    image of Synack
    Security FirmsBug Bounty
    Visit Website

    Synack

    Details

    Synack offers a security testing platform combining elite researchers with technology for continuous vulnerability discovery and risk management.

    ServicesBug Bounty
    image of SysReptor
    Reporting
    Visit Website

    SysReptor

    Details

    SysReptor is a pentest report creator that simplifies report customization, writing, rendering, and platform operation for security professionals.

    Report
    image of TCM Security
    TrainingCertificationsSecurity Firms
    Visit Website

    TCM Security

    Details

    TCM Security offers cybersecurity consulting, penetration testing, auditing, and training services to secure data, systems, and networks.

    TrainingCertificationsServices
    image of TCPCopy
    Application SecurityInfrastructure Security
    Visit Website

    TCPCopy

    Details

    TCPCopy is a powerful stream replay tool used by red teams to clone live TCP traffic for testing firewall bypasses and network security defenses.

    DoS
    image of THC-Hydra
    Infrastructure SecurityReconnaissanceReverse Engineering
    Visit Website

    THC-Hydra

    Details

    THC-Hydra is a fast network login cracker supporting numerous protocols; a valuable tool for security researchers and consultants.

    Bruteforce
    image of TapDucky
    Red Team OperationsInfrastructure Security
    Visit Website

    TapDucky

    Details

    TapDucky turns any rooted phone into the legendary USB Rubber Ducky, enabling Android USB HID keystroke injection for authorized testing and automation.

    Internal
    image of TaskHound
    ReconnaissanceRed Team OperationsInfrastructure Security
    Visit Website

    TaskHound

    Details

    A tool to enumerate privileged Scheduled Tasks on Remote Windows Systems, aiding in identifying potential attack paths.

    Internal
    image of Telespotter
    Reconnaissance
    Visit Website

    Telespotter

    Details

    Telespotter is a RUST-based OSINT tool for phone number reconnaissance, leveraging multiple search engines and people lookup sites.

    OSINT