LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In

Recent

Latest resources

Browse the newest offensive security tools, platforms, and services recently added to HackDB.

LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    image of PentAGI
    AI SecurityApplication SecurityInfrastructure SecurityReconnaissance
    Visit Website

    PentAGI

    Details

    Autonomous AI agent system for complex penetration testing, integrating security tools, long-term memory, and smart task delegation in sandboxed Docker.

    AIOSINTWebInternalExternal
    • Previous
    • 1
    • 2
    • 3
    • More pages
    • 33
    • 34
    • Next
    image of IronPE
    Exploit DevelopmentInfrastructure SecurityRed Team Operations
    Visit Website

    IronPE

    Details

    Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.

    Internal
    image of Black Hat Ethical Hacking
    TrainingSocial EngineeringSecurity Firms
    Visit Website

    Black Hat Ethical Hacking

    Details

    Adversary simulation provider offering manual penetration testing, phishing assessments, offensive security training, and technical tool development.

    TrainingPhishing
    image of MCPScan
    AI Security
    Visit Website

    MCPScan

    Details

    Offensive auditor for MCP servers. Detects RCE, tool poisoning, credential leaks, and SSRF across stdio, HTTP, and SSE transports.

    AI
    image of Neuron
    Reporting
    Visit Website

    Neuron

    Details

    Self-hosted offensive security platform for managing engagements, findings, and delivery. Features on-prem AI reporting and real-time team collaboration.

    Report
    image of Lab401
    Wireless SecurityPhysical SecurityRed Team OperationsReverse Engineering
    Visit Website

    Lab401

    Details

    Premier hardware store for offensive security, providing Flipper Zero, Proxmark, Hak5 tools, SDR equipment, and specialized RFID cloning hardware.

    WirelessPhysicalInternal
    image of Swarmer
    Red Team OperationsInfrastructure Security
    Visit Website

    Swarmer

    Details

    Convert registry exports into NTUSER.MAN hive files to stealthily inject HKCU keys without admin rights, bypassing EDR/AV registry API monitoring.

    Internal
    image of Intruder
    Infrastructure SecurityApplication SecurityReconnaissanceReporting
    Visit Website

    Intruder

    Details

    Unified exposure management platform for automated vulnerability scanning, attack surface monitoring, and cloud security posture management.

    ExternalInternalCloudAPIWeb+2
    image of Cygeniq
    AI Security
    Visit Website

    Cygeniq

    Details

    Cygeniq secures AI systems across their lifecycle with Hexashield AI, GRCortex AI, and CyberTiX AI.

    AI
    image of NeroSwarm Deception Lab
    Red Team OperationsInfrastructure SecurityReconnaissanceApplication Security
    Visit Website

    NeroSwarm Deception Lab

    Details

    NeroSwarm Deception Lab offers free cyber deception tools including honeytoken creation, honeypot script generation, and IP threat reputation checking.

    OSINTInternalExternal
    image of DLLHijackHunter
    Application SecurityBug BountyRed Team Operations
    Visit Website

    DLLHijackHunter

    Details

    DLLHijackHunter is an automated scanner that uses canary DLLs to confirm hijacking vulnerabilities, UAC bypasses, and privilege escalation on Windows.

    Bug BountyStatic AnalysisInternal
    image of Nerva
    ReconnaissanceInfrastructure SecurityRed Team OperationsBug Bounty
    Visit Website

    Nerva

    Details

    Nerva is a high-performance CLI tool for fast service fingerprinting across 120+ protocols (TCP/UDP/SCTP), built by Praetorian for network reconnaissance.

    OSINTExternalInternal