AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs
β429Nov 21, 2025Updated 3 months ago
Alternatives and similar repositories for god-eye
Users that are interested in god-eye are comparing it to the libraries listed below
Sorting:
- An external attack surface monitoring (EASM) tool to find externally accessible documents.β54Feb 2, 2026Updated last month
- π PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden connβ¦β422Feb 13, 2026Updated 3 weeks ago
- Let sliver use msf payload!β25Mar 23, 2025Updated 11 months ago
- CyberFind β a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital investβ¦β58Updated this week
- An Obsidian-Based Second Brain for CyberSecurity Analysts and Professionalsβ54Feb 18, 2026Updated 2 weeks ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MANβ105Jan 26, 2026Updated last month
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated last month
- poc for cve-2025-53772β46Dec 10, 2025Updated 2 months ago
- A Powerful XSS,RXSS,BXSS finding toolβ31Oct 29, 2025Updated 4 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.β40Jun 17, 2025Updated 8 months ago
- Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.β123Aug 10, 2025Updated 6 months ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.β48Dec 18, 2024Updated last year
- β23Jun 28, 2025Updated 8 months ago
- Run GEPA on your favorite non-python libraries.β33Jan 22, 2026Updated last month
- Silent Cleanup UAC Bypass POCβ11Dec 15, 2019Updated 6 years ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real invβ¦β35Nov 15, 2025Updated 3 months ago
- β24Feb 5, 2026Updated last month
- ASHIGARU is a terminal-based interface & system powered by React & Ink that combines the power of modern web technologies with the efficiβ¦β24Jan 2, 2026Updated 2 months ago
- β58Dec 10, 2025Updated 2 months ago
- Discovering Typo Squatting on your domains!β80Jul 30, 2024Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.β227Oct 11, 2025Updated 4 months ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScriptβ17Jul 23, 2025Updated 7 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficientβ¦β16Jan 25, 2026Updated last month
- MDE/MDI Defender setup for Ludusβ38Updated this week
- Here you find the complete list of enrichments and extractionsfor Ubikron.β33Updated this week
- Passive JavaScript reconnaissance for penetration testers β bridging Burp Suite traffic into structured, AST-based analysis in VSCode.β36Feb 5, 2026Updated last month
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to β¦β37Oct 1, 2025Updated 5 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic β¦β36May 1, 2025Updated 10 months ago
- A OSINT project that explores how to dump data from Reactβ81Sep 16, 2025Updated 5 months ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcerβ16Nov 11, 2016Updated 9 years ago
- SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking forβ¦β14Jun 4, 2025Updated 9 months ago
- Automated tool for domains & Subdomains Gatheringβ14Feb 26, 2026Updated last week
- Itβs an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs mβ¦β80Nov 20, 2025Updated 3 months ago
- Using MCP is fun with Cyberbro!β19Jan 27, 2026Updated last month
- Public API client for GETTR, a "non-bias [sic] social network," designed for data archival and analysis.β13Jun 21, 2022Updated 3 years ago
- A tool for mapping cyber crimeβ236Jan 24, 2026Updated last month
- A tool to easily perform GitHub Device Code Phishing on red team engagementsβ87Feb 9, 2026Updated 3 weeks ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.β34Jan 26, 2026Updated last month
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-β¦β83Dec 3, 2025Updated 3 months ago