LogoHackDB
  • Recent
  • Search
  • Pricing
  • Submit
LogoHackDB
LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.

Tag

Explore by tag

Discover offensive security resources related to a specific tag.

icon of HexStrike AIicon of Xygeni Securityicon of OWASP AI Testing Guideicon of ShipSec Studioicon of MCPHammericon of Julius
38+

AI

38 apps

Tools and resources focused on artificial intelligence security, including LLM testing, prompt injection, model exploitation, AI threat modeling, and securing AI-powered applications.

Open tag
icon of Vulnetic Hacking Agenticon of OWASP Foundationicon of PortSwiggericon of Aktoicon of Xygeni Securityicon of Titus
45+

API

45 apps

Security tools and references for testing REST, GraphQL, SOAP, and other APIs, covering authentication flaws, authorization bypass, rate limiting, and API-specific vulnerabilities.

Open tag
icon of Brutusicon of npkicon of KrakenHashesicon of asleapicon of Rubeusicon of Kiterunner
11+

Bruteforce

11 apps

Utilities and methodologies for password attacks, credential stuffing, hash cracking, and automated authentication attempts across web, network, and service-based targets.

Open tag
icon of HexStrike AIicon of bboticon of urlessicon of subwizicon of Porch Pirateicon of Interlace
46+

Bug Bounty

46 apps

Platforms, write-ups, tooling, and resources tailored for bug bounty hunters, including recon workflows, automation, and vulnerability research strategies.

Open tag
icon of MCPHammericon of Muti Metrooicon of SessionHopicon of SILPHicon of Orsted C2icon of BEAR
22+

C2

22 apps

Command-and-control frameworks used in red team operations for post-exploitation, lateral movement, persistence, and adversary simulation.

Open tag
icon of OWASP Foundationicon of Web Security Academyicon of OffSecicon of Zero-Point Security Coursesicon of Pwned Labsicon of APIsec University
24+

Certifications

24 apps

Offensive security certifications, exam prep materials, labs, and study resources for professional development in penetration testing and red teaming.

Open tag
icon of NIST NVDicon of Vulnetic.aiicon of CIS Top 18icon of Gobuster
4+

Classification

4 apps

Resources related to vulnerability classification standards such as CVSS, CWE, OWASP, and risk rating methodologies.

Open tag
icon of Vulnetic Hacking Agenticon of Webhook.siteicon of SecCheckmateicon of Salt Securityicon of Aikidoicon of Terra Security
22+

Cloud

22 apps

Security tools and techniques for assessing AWS, Azure, GCP, and other cloud environments, including IAM abuse, misconfiguration discovery, and cloud-native exploitation.

Open tag
icon of MHDDoSicon of Red Buttonicon of RedWolf Security
3+

DoS

3 apps

Tools and research related to denial-of-service testing, resource exhaustion, rate limiting validation, and availability impact assessment.

Open tag
icon of Vulnetic Hacking Agenticon of Calderaicon of Evilginx Proicon of Metasploiticon of Censysicon of KittySploit Framework
71+

External

71 apps

Resources focused on external perimeter testing, including internet-facing infrastructure, exposed services, DNS, and attack surface discovery.

Open tag
icon of Vulnetic Hacking Agenticon of BloodHound Community Editionicon of PortForwardericon of Brutusicon of AutoPtTicon of SecCheckmate
76+

Internal

76 apps

Tools and methodologies for internal network penetration testing, Active Directory exploitation, lateral movement, and privilege escalation.

Open tag
icon of OWASP Foundationicon of Web Security Academyicon of PortSwiggericon of Titusicon of iSH-toolsicon of APKHunt
16+

Mobile

16 apps

Security testing resources for iOS and Android applications, covering reverse engineering, runtime analysis, mobile API abuse, and client-side vulnerabilities.

Open tag
icon of Xygeni Securityicon of KittySploit Frameworkicon of ShipSec Studioicon of IPinfoicon of Argusicon of Telespotter
33+

OSINT

33 apps

Open-source intelligence tools and techniques used for reconnaissance, data gathering, footprinting, and target profiling.

Open tag
icon of BITBicon of Phishing Clubicon of Lodestar Forgeicon of WifiPumpkin3 Proicon of Modlishkaicon of dnstwist
13+

Phishing

13 apps

Frameworks and resources for phishing simulations, credential harvesting, email security testing, and social engineering campaigns.

Open tag
icon of Red Team Toolsicon of Physical Exploitation Storeicon of EvilCrowRF-V2icon of Access Toolsicon of ICopyXicon of Cellbusters
13+

Physical

13 apps

Tools and methodologies related to physical security assessments, including badge cloning, hardware implants, lock bypass, and facility intrusion testing.

Open tag
icon of BloodHound Community Editionicon of Evilginx Proicon of NIST NVDicon of Aktoicon of SecCheckmateicon of Salt Security
42+

Report

42 apps

Reporting templates, vulnerability write-up examples, executive summaries, and documentation best practices for professional pentest deliverables.

Open tag
icon of Vulnetic Hacking Agenticon of Evilginx Proicon of OWASP Foundationicon of Metasploiticon of Salt Securityicon of Aikido
27+

Services

27 apps

Security firms, managed offensive security providers, consulting organizations, and professional pentesting services.

Open tag
icon of GuidedHackingicon of Aktoicon of Xygeni Securityicon of Titusicon of claudleakicon of Aikido
28+

Static Analysis

28 apps

Static application security testing (SAST) tools and code analysis resources used to identify vulnerabilities without executing the application.

Open tag
icon of GuidedHackingicon of OWASP Foundationicon of Web Security Academyicon of Aktoicon of OffSecicon of DeepLearning.AI
49+

Training

49 apps

Hands-on labs, courses, platforms, and educational resources designed to build offensive security skills.

Open tag
icon of NIST NVDicon of Xygeni Securityicon of IPinfoicon of Salt Securityicon of Aikidoicon of Terra Security
23+

Vulnerability Intelligence

23 apps

Threat intelligence feeds, CVE tracking platforms, exploit databases, and research sources focused on emerging vulnerabilities and exploitation trends.

Open tag
icon of Vulnetic Hacking Agenticon of OWASP Foundationicon of Web Security Academyicon of Metasploiticon of Censysicon of PortSwigger
68+

Web

68 apps

Tools and methodologies for web application security testing, including injection flaws, authentication issues, access control weaknesses, and client/server-side vulnerabilities.

Open tag
icon of hostapicon of SecCheckmateicon of USB-WiFiicon of EAP_bustericon of Freewayicon of WifiPumpkin3 Pro
31+

Wireless

31 apps

Resources for testing Wi-Fi, Bluetooth, RFID, and other wireless technologies, including packet analysis, rogue access points, and wireless exploitation techniques.

Open tag