☆90Apr 30, 2022Updated 3 years ago
Alternatives and similar repositories for cf-bypass
Users that are interested in cf-bypass are comparing it to the libraries listed below
Sorting:
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- ☆13Jul 27, 2020Updated 5 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆47Sep 19, 2022Updated 3 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆986Jan 12, 2024Updated 2 years ago
- Simple tool to decrypt Jenkins encrypted strings☆79Jun 27, 2023Updated 2 years ago
- ☆41Aug 12, 2022Updated 3 years ago
- ☆73Nov 22, 2021Updated 4 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- Unleash the power of cloud☆816Nov 19, 2024Updated last year
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- A Python Obfuscator through AST modification☆26Nov 15, 2019Updated 6 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Aug 9, 2023Updated 2 years ago
- A Poc on blocking Procmon from monitoring network events☆111Aug 7, 2025Updated 7 months ago
- ☆38Nov 27, 2020Updated 5 years ago
- Free, libre, effective, and data-driven wordlists for all!☆648Sep 10, 2021Updated 4 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- ☆13Aug 22, 2025Updated 6 months ago
- IIS shortname scanner written in Go☆355Mar 25, 2023Updated 2 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆256Dec 8, 2021Updated 4 years ago
- Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability☆85Mar 16, 2024Updated 2 years ago
- Searching for virtual hosts among non-resolvable domains☆88Apr 29, 2020Updated 5 years ago