LeeBrotherston / badflareLinks
OSINT tool for discovering the real IP addresses of services which are behind Cloudflare but not properly locked down
☆143Updated last year
Alternatives and similar repositories for badflare
Users that are interested in badflare are comparing it to the libraries listed below
Sorting:
- Wordlists handcrafted (and automated) with ♥☆219Updated 3 months ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆347Updated last year
- a smart DNS response-guided subdomain fuzzer☆151Updated 2 years ago
- Distribute ordinary bash commands over many systems☆166Updated 2 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆176Updated 5 months ago
- Turns any junk text into a usable wordlist for brute-forcing.☆221Updated last year
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆128Updated 11 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆127Updated 2 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆129Updated 3 years ago
- Monitoring the Cloud Landscape☆84Updated last week
- Discover new target domains using Content Security Policy☆447Updated last week
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆89Updated last year
- Daily alert when a new domain name is registered and contains your keywords☆117Updated last year
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆169Updated 3 years ago
- Archive of Potential Insider Threats☆146Updated last year
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Updated 2 years ago
- Search for sensitive data in Postman public library.☆205Updated 5 months ago
- Make URL path combinations using a wordlist☆174Updated last year
- AWS, Azure, Alibaba and Google bucket scanner☆151Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- Filter and enrich a list of subdomains by level☆206Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆181Updated last year
- Prototype pollution scanner using headless chrome☆218Updated 2 years ago
- ☆119Updated 2 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated 3 months ago
- Discover hidden debugging parameters and uncover web application secrets☆240Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- Target practice for ffuf☆66Updated 3 years ago