Project Eyes On is a high-speed, multi-threaded surveillance tool by Y0oshi (@rde0) for locating open IP cameras worldwide. Unifies Google Dorking and Directory Scraping into a single OSINT engine.
☆79Jan 12, 2026Updated 3 months ago
Alternatives and similar repositories for Project-Eyes-On
Users that are interested in Project-Eyes-On are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Privacy-first behavioral intelligence framework for multi-platform analysis and sociodynamic research.☆40Dec 30, 2025Updated 3 months ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- 🔭TeleSpot OSINT lookup from Telephone number using DDGR + BING + GOOGLE + DEHASHED and uses pattern recognition correlations. NOW with T…☆107Feb 26, 2026Updated last month
- Hermes — an ephemeral, Docker-powered OSINT framework for testing, tinkering, and secure investigative automation.☆34Jan 18, 2026Updated 2 months ago
- The United States Code in readable, editable Markdown.☆16May 20, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆46Updated this week
- 📵 A windows desktop program designed for one thing; to help you remove your data from 50+ people-search sites at the source. No cloud, n…☆37Feb 18, 2026Updated last month
- OSINT tool researched and designed to hunt down IG handles☆82Mar 3, 2026Updated last month
- ☆13Aug 1, 2023Updated 2 years ago
- ☆22Feb 13, 2024Updated 2 years ago
- ☆15Apr 10, 2025Updated last year
- Simple, Opinionated benchmark for testing the viability of Efficient Language Models (ELMs) for personal use cases.☆50May 24, 2024Updated last year
- Source of swisskyrepo.github.io - Public☆30Jul 12, 2025Updated 9 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- PhotOSINT is an OSINT chrome extension for images and photos. It scans each webpage for images with EXIF data, while the user is browsing…☆59Jul 15, 2021Updated 4 years ago
- Resources for DFIR. And more.☆11Jul 3, 2024Updated last year
- This repository contains projects and activities that have been completed within the CyberSecurity Bootcamp.☆16May 24, 2022Updated 3 years ago
- The classic launcher, evolved. Fast, Go-based command library equipped with 200+ cybersecurity cheat-sheets. Just install and start hacki…☆123Updated this week
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Cyber Security resource list☆18Jan 21, 2025Updated last year
- A node/integration with the automation workflow manager, n8n: https://n8n.io☆16Feb 15, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆21Mar 27, 2024Updated 2 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- A list of resources to build a information security team.☆15Feb 10, 2021Updated 5 years ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆48Nov 4, 2025Updated 5 months ago
- PowerShell script to generate ShellCode in various formats☆46Sep 25, 2024Updated last year
- SocketLabs Email Delivery PHP Client Library☆10Dec 11, 2023Updated 2 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- a Hadoop Map Reduce application that retrieves data/articles related to sports from sources like NY Times, Commoncrawl, and Twitter and c…☆13Oct 3, 2019Updated 6 years ago
- Automatically add links to your WordPress content.☆25Aug 29, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository stores my learning journey and write-ups throughout the security blue team's Blue Team Junior Analyst Certification☆20May 12, 2024Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆129Apr 6, 2026Updated last week
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 10 months ago
- The ExploitToolFinder Utility [by exploitsecurity.io] assists security researchers in their quest to find the right tool for the job☆17Jun 21, 2023Updated 2 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago