A Cloudflare resolver that works
☆145Jul 1, 2019Updated 6 years ago
Alternatives and similar repositories for cloud-buster
Users that are interested in cloud-buster are comparing it to the libraries listed below
Sorting:
- ☆12Oct 29, 2015Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- ☆16May 6, 2015Updated 10 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- Cloudflare DNS Enumeration Tool for Pentesters☆523Aug 6, 2022Updated 3 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Aug 22, 2018Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Crypto coin mixer☆11Feb 14, 2018Updated 8 years ago
- Cryptopia exchange api wrapper☆12Aug 28, 2017Updated 8 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆389Mar 3, 2025Updated last year
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆16Jul 21, 2018Updated 7 years ago