rohitcoder / hawk-eyeLinks
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆469Updated last week
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below
Sorting:
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆393Updated 2 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆898Updated 3 weeks ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated this week
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆474Updated 4 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆465Updated last year
- ☆261Updated 4 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆231Updated last week
- ☆317Updated last year
- Pen Test Report Generation and Assessment Collaboration☆589Updated last week
- Offline Cybersecurity Knowledge Base☆199Updated this week
- Speed up your pentest enumeration☆83Updated 4 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆416Updated 9 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Updated last year
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆448Updated 3 months ago
- The Internets #1 Subdomain Takeover Tool☆296Updated 8 months ago
- OSINT tool to crawl a site and extract useful recon info.☆453Updated 5 months ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆386Updated 2 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Updated 11 months ago
- 💀 Don't fear the Reaper 👻☆818Updated 2 weeks ago
- Bitor Scanning Software☆453Updated 2 months ago
- Header Exploitation HTTP☆704Updated last week
- ☆195Updated 9 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆723Updated 5 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Updated 5 months ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆302Updated 2 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated 2 months ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 9 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆293Updated last year
- Captures network traffic app made in Rust.☆76Updated 2 weeks ago