rohitcoder / hawk-eyeLinks
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆457Updated 2 weeks ago
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆461Updated last year
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆206Updated 2 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆383Updated 3 weeks ago
- ☆242Updated last month
- ☆317Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆849Updated 2 weeks ago
- Offline Cybersecurity Knowledge Base☆192Updated 2 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆719Updated 3 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆227Updated 8 months ago
- Bitor Scanning Software☆436Updated 3 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated 3 weeks ago
- Pen Test Report Generation and Assessment Collaboration☆579Updated last week
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆386Updated last month
- Pentest Copilot is an AI-powered browser based ethical hacking assistant tool designed to streamline pentesting workflows.☆229Updated last week
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆237Updated last year
- Speed up your pentest enumeration☆83Updated 2 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆429Updated 2 weeks ago
- Captures network traffic app made in Rust.☆74Updated this week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆150Updated this week
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 10 months ago
- An archive of 0day.today exploits☆314Updated 4 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆327Updated 7 months ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆452Updated last week
- ☆243Updated 10 months ago
- Nmap Dashboard Mini Project☆620Updated last year
- ☆191Updated 7 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆211Updated 3 months ago
- The Internets #1 Subdomain Takeover Tool☆287Updated 6 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago