Hacking Tools

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don’t worry if there are any bugs in the tool, we will try to fix them.

This OSINT tool has been created to assist cybersecurity professionals, law enforcement, and security researchers in conducting legal and ethical investigations on email addresses, in compliance with applicable laws.

Any malicious use, such as harassment, fraud, or illegal activities, is strictly prohibited.

TOR66

  • I have the impression that tor66.org has an error, if on tor66 you have an error it’s probably the site that no longer responds!

Important

  • A big thank you to @DarkWebInformer Don’t hesitate to follow him on his Twitter and Linkedin
  • Thank you to everyone who liked my tool, I love you!

Options

[Commands]
     [01] Find webcam URLs
     [02] Find information about an email
     [03] Find information about a person
     [04] Find information about a Phone Number
     [05] Find information about an IP address
     [06] Find Bitcoin Address Information
     [07] Find information on a website
     [99] Clear the screen

Installing Hawker


git clone https://github.com/RetrO-M/Hawker
cd Hawker

Install Python modules 
 - pip install -r requirements.txt

Start the program
 - python main.py

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How OpenClaw Works

Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…

5 days ago

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

7 days ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

1 week ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

1 week ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

1 week ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

3 months ago