A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.
☆472Feb 14, 2026Updated last month
Alternatives and similar repositories for hawk-eye
Users that are interested in hawk-eye are comparing it to the libraries listed below
Sorting:
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆730Feb 14, 2026Updated last month
- Header Exploitation HTTP☆723Updated this week
- FBI Watchdog is a multi-layered domain monitoring tool that detects law enforcement seizures, DNS changes, HTTP fingerprint shifts, WHOIS…☆572Updated this week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated last month
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆497Jan 22, 2026Updated 2 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆413Feb 7, 2026Updated last month
- ☆15Mar 21, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆33Mar 12, 2026Updated last week
- Halberd : Multi-Cloud Agentic Attack Tool☆335Jan 12, 2026Updated 2 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆247Feb 3, 2026Updated last month
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,143Feb 21, 2026Updated last month
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,495Updated this week
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 5 months ago
- ☆39May 4, 2025Updated 10 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆900Mar 12, 2026Updated last week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,315Updated this week
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 8 months ago
- The Ultimate Information Gathering Toolkit☆3,330Dec 10, 2025Updated 3 months ago
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Live validation proxy tool for testing web app vulnerabilities☆832Feb 14, 2026Updated last month
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆234Apr 18, 2025Updated 11 months ago
- Orbis is an full spectrum automated external attack surface intelligent toolkit.☆342Mar 13, 2026Updated last week
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆221Sep 25, 2025Updated 5 months ago
- 🔍 Search anyone's digital footprint across 300+ websites☆3,265Dec 1, 2025Updated 3 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 3 months ago
- Embed a payload inside a PNG file☆371Oct 24, 2024Updated last year
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,249Updated this week
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,679Updated this week
- ☆860Mar 13, 2026Updated last week
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 10 months ago
- All-in-One Toolkit for BruteForce Attacks☆1,086Sep 28, 2024Updated last year
- Open Adversarial Exposure Validation Platform☆1,645Updated this week