MrTurvey / flareproxLinks
Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox
☆189Updated last week
Alternatives and similar repositories for flareprox
Users that are interested in flareprox are comparing it to the libraries listed below
Sorting:
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆115Updated 9 months ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆286Updated 2 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆375Updated 2 months ago
- ☆190Updated 5 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆135Updated last month
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆73Updated 3 weeks ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆211Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆139Updated 6 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆93Updated 10 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆362Updated last month
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 5 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆145Updated last week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆233Updated 8 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆362Updated 2 weeks ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆380Updated 4 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆97Updated 3 weeks ago
- A delicious, but malicious SSL-VPN server 🌮☆250Updated last month
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- A fast WordPress plugin enumeration tool☆692Updated last month
- ☆335Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- A monster cheatsheet on MITM attacks☆365Updated 4 months ago
- Finding secrets in various (non-text) popular files.☆49Updated 3 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆237Updated 3 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆241Updated 8 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆51Updated 4 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆99Updated 2 months ago
- Enhance Your Active Directory Password Spraying with User Intelligence.☆269Updated last month
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆450Updated 2 weeks ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆320Updated 10 months ago