CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital investigators. Search for users across 200+ platforms with speed and accuracy.
☆58Mar 5, 2026Updated this week
Alternatives and similar repositories for cyber-find
Users that are interested in cyber-find are comparing it to the libraries listed below
Sorting:
- Impacket☆49Feb 25, 2026Updated last week
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- Let's make quick work of GraphQL instances ;)☆23Dec 19, 2025Updated 2 months ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- osint tool for dumping links containing trackers from each user on one or all discords☆73May 12, 2025Updated 9 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆39Updated this week
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated 3 weeks ago
- Awesome Security Feeds a curated, structured and automation-friendly collection of security RSS/Atom sources. Based on https://securityfe…☆29Updated this week
- A Tuist-tailored marketplace for Claude☆45Feb 10, 2026Updated 3 weeks ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 2 months ago
- Threat Hunting queries of multiple platforms☆62Feb 26, 2026Updated last week
- An all-in-one Shodan & ZoomEye supported tool to search, browse, preview and dump data leakage across 20+ services. Pulls real exposure s…☆54Dec 1, 2025Updated 3 months ago
- Red Team tools containerized☆76Dec 6, 2025Updated 3 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 4 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 10 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 4 months ago
- crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names fro…☆41Jun 22, 2024Updated last year
- 🖴 Kubernetes-Native Database-Driven Automation☆73Feb 25, 2026Updated last week
- WMI Explorer☆87Jan 5, 2026Updated 2 months ago
- vTPM with SGX protection☆11May 30, 2019Updated 6 years ago
- QRSS Plus: live QRSS grabbers from around the world☆10Feb 9, 2026Updated last month
- ☆90May 29, 2025Updated 9 months ago
- Purple-team telemetry & simulation toolkit.☆108Dec 16, 2025Updated 2 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 3 months ago
- ☆38Jan 19, 2026Updated last month
- This software generates a Helm chart from the user's answers to a series of simple questions.☆28Mar 1, 2025Updated last year
- CLI to list conventional commit types.☆10Sep 21, 2022Updated 3 years ago
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆98Mar 1, 2026Updated last week
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- IDA Terminal☆17Feb 27, 2026Updated last week
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 5 months ago
- A simple-to-use mindmap component☆12Jan 6, 2023Updated 3 years ago
- The prominence of misleading comments will cause both financial loss and loss of customers. In the solution of these 2 basic problems, wh…☆11Jul 15, 2022Updated 3 years ago
- ☆19Updated this week