A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆483Feb 14, 2026Updated 2 months ago
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆732Apr 2, 2026Updated last month
- Header Exploitation HTTP☆733Updated this week
- FBI Watchdog is a multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS…☆633Mar 17, 2026Updated last month
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 3 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆510Jan 22, 2026Updated 3 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆427Feb 7, 2026Updated 2 months ago
- ☆15Mar 21, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆337Apr 8, 2026Updated 3 weeks ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,162Apr 12, 2026Updated 2 weeks ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆248Apr 22, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,517Mar 18, 2026Updated last month
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 7 months ago
- ☆44May 4, 2025Updated 11 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆902Updated this week
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 9 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,344Updated this week
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The Ultimate Information Gathering Toolkit☆3,487Dec 10, 2025Updated 4 months ago
- Live validation proxy tool for testing web app vulnerabilities☆852Mar 24, 2026Updated last month
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆236Apr 18, 2025Updated last year
- Orbis is an full spectrum automated external attack surface intelligent toolkit.☆345Mar 13, 2026Updated last month
- SubOwner - A Simple tool check for subdomain takeovers.☆117Oct 18, 2024Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆226Sep 25, 2025Updated 7 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 4 months ago
- Embed a payload inside a PNG file☆371Oct 24, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🔍 Search anyone's digital footprint across 300+ websites☆3,337Apr 3, 2026Updated 3 weeks ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆4,005Updated this week
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,274Apr 15, 2026Updated 2 weeks ago
- ☆899Mar 25, 2026Updated last month
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 11 months ago
- All-in-One Toolkit for BruteForce Attacks☆1,122Sep 28, 2024Updated last year
- Open Adversarial Exposure Validation Platform☆1,670Apr 25, 2026Updated last week