AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs
β439Nov 21, 2025Updated 4 months ago
Alternatives and similar repositories for god-eye
Users that are interested in god-eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An external attack surface monitoring (EASM) tool to find externally accessible documents.β57Feb 2, 2026Updated last month
- π PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden connβ¦β423Feb 13, 2026Updated last month
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScriptβ17Jul 23, 2025Updated 8 months ago
- β24Updated this week
- Open-source EDR for AI agents. Monitor processes, files, network, and behavior of autonomous AI agents.β110Mar 18, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.β126Aug 10, 2025Updated 7 months ago
- A OSINT project that explores how to dump data from Reactβ81Sep 16, 2025Updated 6 months ago
- Using MCP is fun with Cyberbro!β19Jan 27, 2026Updated 2 months ago
- Let sliver use msf payload!β25Mar 23, 2025Updated last year
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.β40Jun 17, 2025Updated 9 months ago
- Open-Source CLI Penetration Testing Tool To Automate Various Processesβ51Jun 18, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.β20May 27, 2025Updated 10 months ago
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data fromβ¦β52May 1, 2025Updated 10 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MANβ108Jan 26, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Open-source AI-augmented Security Operations Center using LLMs + Multi-Agent Orchestration | Foundation-Sec-8B | Wazuh | TheHive | RAGβ75Updated this week
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated 2 months ago
- β65Feb 12, 2026Updated last month
- Discover and monitor internet assets using favicon hashes across search engines.β247Oct 11, 2025Updated 5 months ago
- Itβs an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs mβ¦β81Nov 20, 2025Updated 4 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-takiβ¦β340Mar 15, 2026Updated last week
- Repository containing slides for conferences I have spoken at.β16Sep 28, 2024Updated last year
- Notion C2 Profile for Mythicβ40Mar 3, 2026Updated 3 weeks ago
- Brute forcing login pages with SQL Injection queries with cURLβ17Feb 23, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Veil 3.1.X (Check version info in Veil at runtime)β16Aug 14, 2019Updated 6 years ago
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulatiβ¦β84Mar 18, 2026Updated last week
- Here you find the complete list of enrichments and extractionsfor Ubikron.β34Mar 6, 2026Updated 3 weeks ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound dataβ360Jan 8, 2026Updated 2 months ago
- β18May 6, 2023Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β76Sep 6, 2024Updated last year
- Secure Code Review AI Agent (SeCoRA) - AI SASTβ55Jan 29, 2025Updated last year
- A small executable to trick a user to authenticate using code matching MFAβ68Oct 6, 2023Updated 2 years ago
- Offline AI Security Assistant for Air-Gapped Pentestingβ73Feb 22, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A simple POC to expose Mythic as a MCP serverβ73Mar 20, 2025Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.β36Aug 20, 2023Updated 2 years ago
- A Powerful XSS,RXSS,BXSS finding toolβ31Oct 29, 2025Updated 4 months ago
- β59Dec 10, 2025Updated 3 months ago
- List of OSINT Repositories starred from GitHub (limited access version)β73Mar 20, 2026Updated last week
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chainβ19Dec 3, 2024Updated last year
- Fluffy-Barnacle - Disposable, ephemeral network infrastructure powered by GitHub Codespaces.β98Mar 14, 2026Updated 2 weeks ago