MrTurvey / flareproxLinks
Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox
☆718Updated last month
Alternatives and similar repositories for flareprox
Users that are interested in flareprox are comparing it to the libraries listed below
Sorting:
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆290Updated last month
- MITM proxy for TCP/TLS/DTLS/UDP traffic, with STARTTLS, IoT, Thick Client and more.☆610Updated 3 weeks ago
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆125Updated 11 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆51Updated last week
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆303Updated this week
- ☆318Updated last week
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆224Updated 3 weeks ago
- Modern web-based distributed hashcracking solution, built on hashcat☆188Updated this week
- A fast WordPress plugin enumeration tool☆745Updated last month
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 5 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆427Updated 2 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆818Updated last week
- NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive secu…☆70Updated last week
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆387Updated last month
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆384Updated this week
- A monster cheatsheet on MITM attacks☆368Updated 6 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 10 months ago
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆448Updated last week
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆269Updated 2 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆166Updated 8 months ago
- An archive of 0day.today exploits☆321Updated 5 months ago
- ☆374Updated 2 months ago
- ☆570Updated last year
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 3 months ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆221Updated last year
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆173Updated last month
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Updated last year
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated 3 weeks ago
- Red Team tools containerized☆74Updated 2 weeks ago