A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆485Feb 14, 2026Updated 3 months ago
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆245Jul 31, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆733Apr 2, 2026Updated last month
- Header Exploitation HTTP☆742May 8, 2026Updated 2 weeks ago
- FBI Watchdog is a multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS…☆646Mar 17, 2026Updated 2 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102May 1, 2026Updated 3 weeks ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆515May 16, 2026Updated last week
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆433Feb 7, 2026Updated 3 months ago
- ☆15Mar 21, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated 2 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆337Apr 8, 2026Updated last month
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,173May 8, 2026Updated 2 weeks ago
- Advanced Client-Side Prototype Pollution Scanner☆247May 11, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,526Mar 18, 2026Updated 2 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆132Dec 2, 2023Updated 2 years ago
- Simple hunting script for suspicious M365 OAuth Apps☆324Sep 23, 2025Updated 8 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆901May 12, 2026Updated last week
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 10 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,353Updated this week
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Live validation proxy tool for testing web app vulnerabilities☆859Mar 24, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Ultimate Information Gathering Toolkit☆3,577Dec 10, 2025Updated 5 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆237Apr 18, 2025Updated last year
- Orbis is an full spectrum automated external attack surface intelligent toolkit.☆349Mar 13, 2026Updated 2 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆117Oct 18, 2024Updated last year
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…