LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In
LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.

    Tag

    Vulnerability Intelligence

    Threat intelligence feeds, CVE tracking platforms, exploit databases, and research sources focused on emerging vulnerabilities and exploitation trends.

    Back to tags
    • Previous
    • 1
    • 2
    • Next
    image of NIST NVD
    ReportingVulnerability Intelligence
    Visit Website

    NIST NVD

    Details

    The NVD is the U.S. government repository of standards-based vulnerability management data, enabling red teams to analyze CVEs and assess security risks.

    ReportClassificationVulnerability Intelligence
    image of AI-Red-Teaming-Playground-Labs
    AI SecurityRed Team OperationsTraining
    Visit Website

    AI-Red-Teaming-Playground-Labs

    Details

    AI Red Teaming Playground Labs: Challenges for AI red teaming training, covering adversarial ML and Responsible AI failures.

    TrainingAIVulnerability IntelligenceExternal
    image of Aikido
    Cloud SecurityApplication SecurityAPI SecurityVulnerability IntelligenceReportingAI Security
    Visit Website

    Aikido

    Details

    Aikido is a security platform for code and cloud, designed to automatically find and fix vulnerabilities in one central system.

    CloudAPIAIReportWeb+5
    image of AttackerKB
    Vulnerability Intelligence
    Visit Website

    AttackerKB

    Details

    AttackerKB is a community-driven database for evaluating exploit utility. It helps red teams prioritize vulnerabilities based on real-world impact.

    Vulnerability Intelligence
    image of CVEDetails
    Vulnerability Intelligence
    Visit Website

    CVEDetails

    Details

    CVE Details is a comprehensive security vulnerability database that aggregates CVEs, OVAL entries, and CVSS scores to help track software security flaws.

    Vulnerability Intelligence
    image of CXSECURITY.COM
    Vulnerability Intelligence
    Visit Website

    CXSECURITY.COM

    Details

    CXSECURITY.COM provides independent security information, a vast collection of data communication safety insights, and vulnerability details.

    Vulnerability Intelligence
    image of EnforsterAI
    AI SecurityApplication SecurityAPI SecurityCloud SecurityVulnerability Intelligence
    Visit Website

    EnforsterAI

    Details

    AI-native SAST tool for code security, detecting vulnerabilities, secrets, IaC issues, and AI model security with actionable AI fixes.

    AIStatic AnalysisAPICloudWeb+1
    image of Exploit Database
    Vulnerability Intelligence
    Visit Website

    Exploit Database

    Details

    Exploit Database (Exploit-DB) is a curated repository of public exploits and proof-of-concepts for offensive and defensive security professionals.

    Vulnerability Intelligence
    image of Exploit.IN
    Vulnerability Intelligence
    Visit Website

    Exploit.IN

    Details

    Exploit.IN delivers the latest news, research, and tools concerning hacking, exploits, vulnerabilities, malware, and cybersecurity laws.

    Vulnerability Intelligence
    image of GreyNoise
    ReconnaissanceVulnerability Intelligence
    Visit Website

    GreyNoise

    Details

    GreyNoise Visualizer helps security professionals investigate internet noise and uncover real-time vulnerability exploitation trends.

    OSINTVulnerability Intelligence
    image of IPinfo
    Vulnerability IntelligenceReconnaissance
    Visit Website

    IPinfo

    Details

    IPinfo provides comprehensive IP address data, geolocation, and intelligence for developers and enterprises, powering applications and security solutions.

    OSINTVulnerability Intelligence
    image of Intruder
    Infrastructure SecurityApplication SecurityReconnaissanceReporting
    Visit Website

    Intruder

    Details

    Unified exposure management platform for automated vulnerability scanning, attack surface monitoring, and cloud security posture management.

    ExternalInternalCloudAPIWeb+2