LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of AttackForge
    Reporting
    Visit Website

    AttackForge

    Details

    AttackForge is a pentest management and reporting platform that streamlines penetration testing workflows and enhances collaboration across security projects.

    Report
    • Previous
    • 1
    • More pages
    • 3
    • 4
    • 5
    • More pages
    • 33
    • Next
    image of AttackerKB
    Vulnerability Intelligence
    Visit Website

    AttackerKB

    Details

    AttackerKB is a community-driven database for evaluating exploit utility. It helps red teams prioritize vulnerabilities based on real-world impact.

    Vulnerability Intelligence
    image of AutoPtT
    Red Team OperationsInfrastructure Security
    Visit Website

    AutoPtT

    Details

    Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack, implemented in C++ and Python.

    Internal
    image of AutoRecon
    ReconnaissanceInfrastructure Security
    Visit Website

    AutoRecon

    Details

    AutoRecon is a network reconnaissance tool that automates service enumeration and port scanning for multiple targets.

    Internal
    image of AzureHound
    Cloud SecurityInfrastructure SecurityReconnaissance
    Visit Website

    AzureHound

    Details

    AzureHound is a BloodHound data collector for Microsoft Azure, enabling security professionals to map attack paths in Azure environments.

    Cloud
    image of BBOT
    ReconnaissanceRed Team Operations
    Visit Website

    BBOT

    Details

    BBOT is a recursive internet scanner for hackers, automating recon, bug bounties, and ASM with a suite of offensive web modules.

    Bug BountyWebExternal
    image of BC Security
    Red Team Operations
    Visit Website

    BC Security

    Details

    BC Security provides cybersecurity assessments and training, offering technical expertise and compliance knowledge for today's business world.

    Internal
    image of BEAR
    Red Team Operations
    Visit Website

    BEAR

    Details

    Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups.

    C2
    image of BITB
    Social EngineeringRed Team Operations
    Visit Website

    BITB

    Details

    Provides browser window templates for Browser In The Browser (BITB) phishing attacks, enabling realistic simulations for social engineering engagements.

    Phishing
    image of BYOB
    Reverse EngineeringExploit DevelopmentRed Team Operations
    Visit Website

    BYOB

    Details

    BYOB is an open-source post-exploitation framework for students, researchers, and developers to build and manage botnets.

    C2
    image of Binary Ninja
    Reverse Engineering
    Visit Website

    Binary Ninja

    Details

    Binary Ninja is a reverse engineering platform with a scriptable decompiler, disassembler, and debugger for analyzing binaries.

    Static AnalysisMobileWeb
    image of Bishop Fox
    Security Firms
    Visit Website

    Bishop Fox

    Details

    Bishop Fox is a leading offensive security firm providing continuous pen testing, red teaming, and attack surface management solutions.

    Services