LogoHackDB
RecentSearchCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Items

    Browse all items

    Browse all offensive security tools, platforms, and services in one place.

    image of CloudQuery
    Cloud SecurityInfrastructure Security
    Visit Website

    CloudQuery

    Details

    CloudQuery provides a developer-first cloud governance platform for security, compliance, and cost visibility across multi-cloud environments.

    ReportCloud
    • Previous
    • 1
    • More pages
    • 6
    • 7
    • 8
    • More pages
    • 33
    • Next
    image of CloudSploit
    Cloud Security
    Visit Website

    CloudSploit

    Details

    CloudSploit by Aqua scans cloud infrastructure for security risks, supporting AWS, Azure, GCP, OCI, and GitHub.

    Cloud
    image of Cobalt
    Red Team OperationsSecurity Firms
    Visit Website

    Cobalt

    Details

    Cobalt provides offensive security services with a SaaS platform, offering pentesting and vulnerability management for modern security needs.

    ExternalServicesReport
    image of Cobalt Strike
    Red Team Operations
    Visit Website

    Cobalt Strike

    Details

    Cobalt Strike: adversary simulation tool emulating advanced threat actors in IT networks using Beacon, a post-exploitation agent.

    ExternalC2Internal
    image of Commix
    Application Security
    Visit Website

    Commix

    Details

    Commix is an open-source penetration testing tool for detecting and exploiting command injection vulnerabilities in web applications.

    Web
    image of Corellium Virtual Hardware
    Application Security
    Visit Website

    Corellium Virtual Hardware

    Details

    Corellium provides virtualized iOS, Android, and Arm devices for accelerated security testing, research, and DevSecOps.

    MobileTrainingServicesStatic Analysis
    image of Covert Instruments
    Physical Security
    Visit Website

    Covert Instruments

    Details

    Covert Instruments offers best-in-class lock picks & entry tools for locksmiths, hobbyists, and security professionals to elevate skills.

    Physical
    image of CrackMapExec
    Infrastructure Security
    Visit Website

    CrackMapExec

    Details

    CrackMapExec is a swiss army knife for pentesting Windows networks, automating common tasks for assessing security vulnerabilities.

    Internal
    image of CrackMy.App
    Reverse Engineering
    Visit Website

    CrackMy.App

    Details

    CrackMy.App: Share crackmes, solve reverse engineering challenges, and compete on the leaderboard in this ultimate community.

    Training
    image of Crackmes.one
    Reverse Engineering
    Visit Website

    Crackmes.one

    Details

    Crackmes.one offers a vast collection of reverse engineering challenges to help hone your binary exploitation and reverse engineering skills.

    Training
    image of Cutter
    Reverse EngineeringExploit Development
    Visit Website

    Cutter

    Details

    Cutter is a free and open-source reverse engineering platform powered by Rizin, designed for user-friendly and advanced analysis.

    Static Analysis
    image of CyberChef
    Reverse EngineeringApplication Security
    Visit Website

    CyberChef

    Details

    CyberChef is a web app for encryption, encoding, compression, and data analysis, offering a wide range of operations in a drag-and-drop interface.

    WebMobileBug Bounty