rohitcoder / hawk-eyeLinks
A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆468Updated this week
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below
Sorting:
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆462Updated 4 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆388Updated 2 months ago
- ☆258Updated 3 months ago
- Offline Cybersecurity Knowledge Base☆199Updated last week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆896Updated 2 weeks ago
- ☆316Updated last year
- Pen Test Report Generation and Assessment Collaboration☆587Updated last month
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated 2 weeks ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆230Updated this week
- Bitor Scanning Software☆451Updated 2 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆722Updated 5 months ago
- Speed up your pentest enumeration☆83Updated 3 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆463Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Updated last year
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆442Updated 3 months ago
- The Internets #1 Subdomain Takeover Tool☆293Updated 7 months ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆359Updated 2 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆331Updated 2 weeks ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆401Updated last month
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Updated 10 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆410Updated 9 months ago
- Nmap Dashboard Mini Project☆623Updated last year
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆263Updated this week
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Updated 4 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 11 months ago
- ☆195Updated 9 months ago
- An archive of 0day.today exploits☆332Updated 6 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆269Updated 3 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago