rohitcoder / hawk-eyeLinks
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆461Updated this week
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below
Sorting:
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆850Updated last week
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆386Updated last month
- ☆248Updated 2 months ago
- ☆317Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆430Updated last week
- Offline Cybersecurity Knowledge Base☆192Updated last week
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆219Updated 2 months ago
- Pen Test Report Generation and Assessment Collaboration☆584Updated 2 weeks ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆462Updated last year
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆226Updated 8 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆718Updated 4 months ago
- Pentest Copilot is an AI-powered browser based ethical hacking assistant tool designed to streamline pentesting workflows.☆233Updated 3 weeks ago
- The Internets #1 Subdomain Takeover Tool☆287Updated 6 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 6 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆238Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 10 months ago
- OSINT tool to crawl a site and extract useful recon info.☆451Updated 4 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆152Updated 2 weeks ago
- Web Security Scanner☆367Updated last month
- Speed up your pentest enumeration☆83Updated 2 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆326Updated this week
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆288Updated last year
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆482Updated 3 weeks ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆211Updated 3 months ago
- Captures network traffic app made in Rust.☆74Updated this week
- API Security Vulnerability Scanner designed to help you secure your APIs.☆224Updated last week
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆405Updated 2 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆331Updated 7 months ago
- An archive of 0day.today exploits☆316Updated 4 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 11 months ago