Hacking Tools

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don’t worry if there are any bugs in the tool, we will try to fix them.

This OSINT tool has been created to assist cybersecurity professionals, law enforcement, and security researchers in conducting legal and ethical investigations on email addresses, in compliance with applicable laws.

Any malicious use, such as harassment, fraud, or illegal activities, is strictly prohibited.

TOR66

  • I have the impression that tor66.org has an error, if on tor66 you have an error it’s probably the site that no longer responds!

Important

  • A big thank you to @DarkWebInformer Don’t hesitate to follow him on his Twitter and Linkedin
  • Thank you to everyone who liked my tool, I love you!

Options

[Commands]
     [01] Find webcam URLs
     [02] Find information about an email
     [03] Find information about a person
     [04] Find information about a Phone Number
     [05] Find information about an IP address
     [06] Find Bitcoin Address Information
     [07] Find information on a website
     [99] Clear the screen

Installing Hawker


git clone https://github.com/RetrO-M/Hawker
cd Hawker

Install Python modules 
 - pip install -r requirements.txt

Start the program
 - python main.py

Varshini

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

8 minutes ago

hrtng IDA Plugin : Elevating IDA’s Capabilities For Advanced Malware Analysis

hrtng IDA plugin is a collection of tools, ideas and experiments from different sources I've…

22 minutes ago

DarkFlare : Bypassing Censorship With TCP-Over-CDN Technology

A stealthy command line tool to create TCP-over-CDN(http) tunnels that keep your connections cozy and…

2 days ago

BootExecute EDR Bypass : A Deep Dive Into Early Execution Techniques

Boot Execute allows native applications—executables with the NtProcessStartup entry point and dependencies solely on ntdll.dll—to…

2 days ago

Hooka : Advanced Shellcode Loader Generation With Enhanced Evasion Techniques

Hooka is able to generate shellcode loaders with multiple capabilities. It is also based on…

2 days ago

GBounty : Streamlining Vulnerability Scanning For Web Applications

Multi-step website vulnerability scanner designed to help pentesters and bug hunters identify potential vulnerabilities in…

2 days ago