LeeBrotherston / badflare
OSINT tool for discovering the real IP addresses of services which are behind Cloudflare but not properly locked down
☆141Updated last year
Alternatives and similar repositories for badflare
Users that are interested in badflare are comparing it to the libraries listed below
Sorting:
- Wordlists handcrafted (and automated) with ♥☆219Updated 2 months ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆347Updated last year
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Updated 2 years ago
- Turns any junk text into a usable wordlist for brute-forcing.☆220Updated last year
- A robust Red Team proxy written in Go.☆160Updated 3 years ago
- AWS, Azure, Alibaba and Google bucket scanner☆150Updated last year
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆175Updated 4 months ago
- Fast website scraper and wordlist generator☆77Updated last week
- Self-hosted passive subdomain continous monitoring tool.☆162Updated last year
- Distribute ordinary bash commands over many systems☆165Updated 2 years ago
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆86Updated last year
- a smart DNS response-guided subdomain fuzzer☆151Updated 2 years ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆210Updated last week
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆127Updated 3 years ago
- Filter and enrich a list of subdomains by level☆204Updated last year
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Updated 2 years ago
- Discover new target domains using Content Security Policy☆428Updated 2 weeks ago
- Session Hijacking Visual Exploitation☆199Updated last year
- Make URL path combinations using a wordlist☆174Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆179Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- Archive of Potential Insider Threats☆145Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆270Updated last year
- Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.☆237Updated 3 months ago
- ☆119Updated 2 years ago
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆170Updated this week
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆64Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week