OSINT tool for discovering the real IP addresses of services which are behind Cloudflare but not properly locked down
☆155May 1, 2024Updated last year
Alternatives and similar repositories for badflare
Users that are interested in badflare are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 9 months ago
- 🐙 Track down GitHub users.☆971Oct 4, 2025Updated 5 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆20Jul 24, 2022Updated 3 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆131Mar 10, 2022Updated 4 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Discover hidden debugging parameters and uncover web application secrets☆246Feb 4, 2026Updated last month
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆449Nov 2, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆181Dec 22, 2025Updated 3 months ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- 🚀 A DNS automated scanner and tool 🖱️ (Zone Transfer, DNS Zone Takeover, Subdomain Takeover).☆299Oct 5, 2024Updated last year
- Infrastructure Automation☆357Apr 12, 2024Updated last year
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- The Token Stealer☆513Jul 13, 2022Updated 3 years ago
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆818Jun 9, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Poastal - the Email OSINT tool☆590Apr 8, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- declutters url lists for crawling/pentesting☆1,539Feb 23, 2025Updated last year
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Dec 29, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Aug 4, 2025Updated 7 months ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆487Sep 24, 2025Updated 6 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- OXO is a security scanning orchestrator for the modern age.☆564Updated this week
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 4 months ago