Roni-Carta / cf-bypassView external linksLinks
☆90Apr 30, 2022Updated 3 years ago
Alternatives and similar repositories for cf-bypass
Users that are interested in cf-bypass are comparing it to the libraries listed below
Sorting:
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆19Aug 31, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- ☆13Jul 27, 2020Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- an Evil Java RMI Registry.☆51Feb 8, 2023Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- ☆42Aug 12, 2022Updated 3 years ago
- A Python Obfuscator through AST modification☆26Nov 15, 2019Updated 6 years ago
- Unleash the power of cloud☆821Nov 19, 2024Updated last year
- Simple tool to decrypt Jenkins encrypted strings☆79Jun 27, 2023Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Mar 2, 2022Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- ☆22Dec 30, 2025Updated last month
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆975Jan 12, 2024Updated 2 years ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆47Sep 19, 2022Updated 3 years ago
- A Poc on blocking Procmon from monitoring network events☆111Aug 7, 2025Updated 6 months ago
- ☆73Nov 22, 2021Updated 4 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆17Sep 12, 2022Updated 3 years ago
- ☆21Jul 24, 2022Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆143Feb 24, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- ☆34Oct 29, 2020Updated 5 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Aug 9, 2023Updated 2 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 2 months ago
- ☆24Jun 9, 2024Updated last year
- Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability☆88Mar 16, 2024Updated last year
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 8 months ago
- Scan for potentially vulnerable drivers☆94Mar 5, 2022Updated 3 years ago