SageHack / cloud-buster
A Cloudflare resolver that works
☆145Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for cloud-buster
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆83Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆165Updated 7 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆71Updated 8 years ago
- ssh public host key scanner using shodan☆117Updated 5 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Search exploits in multiple exploit databases!☆80Updated 4 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Advanced Controller/Server/Client Reverse Shell/Bot – Windows/Linux – Python☆69Updated 8 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆104Updated 8 years ago
- MassBleed SSL Vulnerability Scanner☆240Updated 4 years ago
- ☆52Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆228Updated 8 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆516Updated 7 years ago
- Tools for harvesting email addresses for phishing attacks |☆84Updated 9 years ago
- Some exploits and exploit development stuff.☆146Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆124Updated last year
- Abusing Self-XSS and Clickjacking to trigger XSS☆130Updated 7 years ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler☆80Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Updated 7 years ago
- Automated digital reconnaissance☆193Updated last year