Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona, including financial, social, and personal accounts, to detect data breaches or hacks. With real-time notifications via text or email, you can take action before it's too late. Stay safe and secure with HackAl…
☆18Oct 16, 2024Updated last year
Alternatives and similar repositories for HackAlert
Users that are interested in HackAlert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- ☆20Jul 7, 2024Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆38Jul 31, 2023Updated 2 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated last year
- ☆15Apr 5, 2023Updated 3 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Sep 30, 2024Updated last year
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated 3 months ago
- Minified version of Project Sherlock written in GO. Lookup given username from 1000 social networks☆32Oct 19, 2023Updated 2 years ago
- 1000 black hat tools Collected From github☆17Nov 28, 2019Updated 6 years ago
- ☆18Apr 3, 2023Updated 3 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆92Aug 11, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Apr 21, 2023Updated 3 years ago
- ☆20Apr 5, 2023Updated 3 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- Automation to report malicious actors to AbuseIPDB for users of Cloudflare WAF☆21May 24, 2025Updated 11 months ago
- ☆25Aug 2, 2023Updated 2 years ago
- An Interface for AI built for cybersecurity professionals☆94Feb 19, 2025Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆26Dec 24, 2025Updated 4 months ago
- Tools for bug bounty☆29Jul 9, 2025Updated 10 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Jul 26, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 3 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆18Jan 13, 2024Updated 2 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 5 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Gather information about a Duolingo user☆85Aug 15, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 6 months ago
- Application scanning component of OWASP PurpleTeam☆15Feb 12, 2023Updated 3 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- Simple Tool for webhacking☆10Apr 4, 2023Updated 3 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 11 months ago