LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of CVEDetails
    Vulnerability Intelligence
    Visit Website

    CVEDetails

    Details

    CVE Details is a comprehensive security vulnerability database that aggregates CVEs, OVAL entries, and CVSS scores to help track software security flaws.

    Vulnerability Intelligence
    • Previous
    • 1
    • More pages
    • 5
    • 6
    • 7
    • More pages
    • 33
    • Next
    image of CWE Common Weakness Enumeration
    ReportingApplication Security
    Visit Website

    CWE Common Weakness Enumeration

    Details

    A comprehensive community-developed list of common software and hardware weaknesses to help identify and mitigate security issues.

    ReportWeb
    image of CXSECURITY.COM
    Vulnerability Intelligence
    Visit Website

    CXSECURITY.COM

    Details

    CXSECURITY.COM provides independent security information, a vast collection of data communication safety insights, and vulnerability details.

    Vulnerability Intelligence
    image of CanIPhish
    TrainingSocial Engineering
    Visit Website

    CanIPhish

    Details

    CanIPhish is a platform for simulated phishing and security awareness training, offering realistic simulations and integrated eLearning.

    Phishing
    image of Canarytokens
    Infrastructure SecurityRed Team OperationsReporting
    Visit Website

    Canarytokens

    Details

    Canarytokens is a free tool to plant traps in your network that notify you when triggered, helping you detect breaches early.

    Phishing
    image of Cellbusters
    Physical SecurityWireless Security
    Visit Website

    Cellbusters

    Details

    Cellbusters develops RF detection and signal locating tech to guard against security threats in prisons, government, casinos, and more.

    WirelessPhysical
    image of Certipy
    Infrastructure Security
    Visit Website

    Certipy

    Details

    Certipy is a toolkit for enumerating and abusing Active Directory Certificate Services (AD CS) with ESC1-ESC16 attack path support.

    Internal
    image of Chisel
    Infrastructure Security
    Visit Website

    Chisel

    Details

    Chisel: A fast TCP/UDP tunnel over HTTP, secured via SSH. Useful for firewalls, providing secure network endpoints.

    Internal
    image of ChromeAlone
    Red Team OperationsExploit Development
    Visit Website

    ChromeAlone

    Details

    ChromeAlone transforms Chromium browsers into C2 implants, enabling covert operations with session stealing, credential capture, and remote execution.

    C2Internal
    image of Ciphey
    Reverse Engineering
    Visit Website

    Ciphey

    Details

    Ciphey is an automated decryption, decoding, and cracking tool that uses NLP and AI to decipher encryptions without knowing the key or cipher.

    ExternalBruteforce
    image of CloudFox
    Cloud SecurityInfrastructure Security
    Visit Website

    CloudFox

    Details

    CloudFox helps penetration testers find exploitable attack paths in cloud infrastructure, currently supporting AWS with more on the way.

    Cloud
    image of CloudGoat
    Cloud SecurityTraining
    Visit Website

    CloudGoat

    Details

    CloudGoat is a "Vulnerable by Design" AWS deployment tool for honing cloud cybersecurity skills through CTF-style scenarios.

    TrainingCloud