MrTurvey / flareproxLinks
Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox
☆746Updated 3 months ago
Alternatives and similar repositories for flareprox
Users that are interested in flareprox are comparing it to the libraries listed below
Sorting:
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆314Updated 2 months ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆303Updated 2 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆326Updated 3 weeks ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆504Updated last month
- ☆345Updated this week
- Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets☆128Updated last year
- MITM proxy for TCP/TLS/DTLS/UDP traffic, with STARTTLS, IoT, Thick Client and more.☆692Updated last month
- ☆1,035Updated 2 weeks ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆398Updated this week
- Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more☆603Updated this week
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Updated 2 months ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆386Updated 2 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 6 months ago
- ☆170Updated last month
- Proxy system that routes traffic through Cloudflare Workers for IP rotation and anonymity☆587Updated 3 weeks ago
- ☆197Updated last week
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆289Updated 6 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆110Updated 6 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆211Updated last month
- ☆43Updated last week
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆545Updated last month
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆404Updated last month
- Search for all leaked keys/secrets using one regex! bugbounty☆182Updated 10 months ago
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆296Updated last month
- [ARCHIVED] Evolved into BugTraceAI v2 — github.com/BugTraceAI/BugTraceAI☆235Updated this week
- Passive leak enumeration tool.☆266Updated this week
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆505Updated 2 weeks ago
- An archive of 0day.today exploits☆341Updated 6 months ago
- world's first Opensource fully Autonomous AI Security Engineer☆228Updated 2 months ago
- A fast WordPress plugin enumeration tool☆760Updated 2 weeks ago