rohitcoder / hawk-eyeLinks
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆388Updated last week
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below
Sorting:
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆190Updated last week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆732Updated 2 weeks ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- ☆312Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆679Updated last week
- A fast WordPress plugin enumeration tool☆522Updated last week
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆279Updated 9 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆637Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆229Updated 10 months ago
- ☆718Updated last month
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆389Updated last month
- Pen Test Report Generation and Assessment Collaboration☆531Updated this week
- The Internets #1 Subdomain Takeover Tool☆260Updated 3 weeks ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆942Updated 3 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆128Updated 5 months ago
- Offline Cybersecurity Knowledge Base☆167Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆257Updated last week
- The Most Advanced Client-Side Prototype Pollution Scanner☆224Updated last week
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆230Updated 3 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆282Updated this week
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆252Updated this week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆103Updated 6 months ago
- Bitor Scanning Software☆383Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆120Updated 2 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆421Updated 5 months ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆173Updated 11 months ago
- Speed up your pentest enumeration☆84Updated 2 weeks ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆162Updated this week
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆139Updated 3 months ago
- Web Security Scanner☆323Updated last week