A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆471Feb 14, 2026Updated 2 weeks ago
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below
Sorting:
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Jul 31, 2024Updated last year
- Header Exploitation HTTP☆711Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆725Feb 14, 2026Updated 2 weeks ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆452May 23, 2025Updated 9 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆403Feb 7, 2026Updated 3 weeks ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated last month
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Updated this week
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆220Sep 25, 2025Updated 5 months ago
- ☆39May 4, 2025Updated 9 months ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆489Jan 22, 2026Updated last month
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 2 months ago
- The Ultimate Information Gathering Toolkit☆3,258Dec 10, 2025Updated 2 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- VirtualBox Web Control Panel is a lightweight HTTP server script providing a simple web interface to list, control, and interact with Vir…☆25Apr 15, 2025Updated 10 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆898Feb 23, 2026Updated last week
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆334Oct 25, 2025Updated 4 months ago
- Live validation proxy tool for testing web app vulnerabilities☆831Feb 14, 2026Updated 2 weeks ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆473Oct 29, 2025Updated 4 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆246Feb 3, 2026Updated 3 weeks ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆13Oct 24, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago
- Mapping of open-source detection rules and atomic tests.☆201Feb 16, 2026Updated 2 weeks ago
- Simple hunting script for suspicious M365 OAuth Apps☆321Sep 23, 2025Updated 5 months ago
- Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secrets☆137Jan 21, 2025Updated last year
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,022Mar 21, 2025Updated 11 months ago
- ☆847Jan 12, 2026Updated last month
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Bitor Scanning Software☆454Nov 7, 2025Updated 3 months ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,139Feb 21, 2026Updated last week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Dec 2, 2025Updated 3 months ago