MrTurvey / flareproxLinks
Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox
☆708Updated 3 weeks ago
Alternatives and similar repositories for flareprox
Users that are interested in flareprox are comparing it to the libraries listed below
Sorting:
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆121Updated 11 months ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆301Updated 4 months ago
- MITM proxy for TCP/TLS/DTLS/UDP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more.☆539Updated 3 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 10 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated 3 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆387Updated 4 months ago
- Extracts URLs from OSINT Archives for Security Insights☆171Updated last week
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆383Updated 3 weeks ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆144Updated 8 months ago
- An archive of 0day.today exploits☆314Updated 4 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆374Updated last year
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆116Updated 2 weeks ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆801Updated last week
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆105Updated 4 months ago
- ☆191Updated 7 months ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆380Updated 6 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆462Updated 2 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆192Updated last week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆457Updated 2 weeks ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 7 months ago
- A fast WordPress plugin enumeration tool☆731Updated last month
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆215Updated 8 months ago
- ☆63Updated 6 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- Check bitrix vulnerabilities☆88Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆242Updated last week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 2 months ago
- wappalyzer alternative based on wappalyzer browser extension☆291Updated 2 weeks ago
- ☆138Updated last month