MrTurvey / flareproxLinks
Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox
☆746Updated 3 months ago
Alternatives and similar repositories for flareprox
Users that are interested in flareprox are comparing it to the libraries listed below
Sorting:
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆290Updated 2 months ago
- MITM proxy for TCP/TLS/DTLS/UDP traffic, with STARTTLS, IoT, Thick Client and more.☆692Updated last month
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆504Updated last month
- ☆345Updated this week
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆303Updated 2 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆326Updated 3 weeks ago
- Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more☆481Updated last week
- ☆1,035Updated 2 weeks ago
- Proxy system that routes traffic through Cloudflare Workers for IP rotation and anonymity☆587Updated 3 weeks ago
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆128Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆393Updated 2 months ago
- A fast WordPress plugin enumeration tool☆760Updated 2 weeks ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆289Updated 6 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 6 months ago
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆296Updated last month
- MITM Field Manual☆368Updated last month
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆386Updated 2 months ago
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆505Updated 2 weeks ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Updated 2 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆428Updated 2 months ago
- Header Exploitation HTTP☆706Updated last week
- ☆43Updated last week
- Search for all leaked keys/secrets using one regex! bugbounty☆182Updated 10 months ago
- ☆197Updated last week
- ☆82Updated 8 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆110Updated 6 months ago
- React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)☆183Updated 2 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆842Updated last month
- ☆274Updated 2 months ago