A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆480Feb 14, 2026Updated last month
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆728Apr 2, 2026Updated last week
- Header Exploitation HTTP☆730Apr 3, 2026Updated last week
- FBI Watchdog is a multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS…☆622Mar 17, 2026Updated 3 weeks ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆503Jan 22, 2026Updated 2 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆421Feb 7, 2026Updated 2 months ago
- ☆15Mar 21, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated 3 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆335Updated this week
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆248Mar 30, 2026Updated last week
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,150Feb 21, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,514Mar 18, 2026Updated 3 weeks ago
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 6 months ago
- ☆40May 4, 2025Updated 11 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆900Mar 12, 2026Updated last month
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 8 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,326Updated this week
- The Ultimate Information Gathering Toolkit☆3,428Dec 10, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Live validation proxy tool for testing web app vulnerabilities☆844Mar 24, 2026Updated 2 weeks ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆234Apr 18, 2025Updated 11 months ago
- Orbis is an full spectrum automated external attack surface intelligent toolkit.☆344Mar 13, 2026Updated 3 weeks ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆227Sep 25, 2025Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆90Dec 7, 2025Updated 4 months ago
- Embed a payload inside a PNG file☆373Oct 24, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🔍 Search anyone's digital footprint across 300+ websites☆3,313Apr 3, 2026Updated last week
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,941Updated this week
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,262Mar 19, 2026Updated 3 weeks ago
- ☆898Mar 25, 2026Updated 2 weeks ago
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 10 months ago
- All-in-One Toolkit for BruteForce Attacks☆1,114Sep 28, 2024Updated last year
- Open Adversarial Exposure Validation Platform☆1,655Apr 5, 2026Updated last week