Unit-259 / cloudflare_oobLinks
OOB listener powered by cloudflare workers
☆13Updated 7 months ago
Alternatives and similar repositories for cloudflare_oob
Users that are interested in cloudflare_oob are comparing it to the libraries listed below
Sorting:
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆15Updated 10 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆27Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆62Updated 4 months ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆17Updated 2 months ago
- CrlfiX☆20Updated 9 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Updated 5 months ago
- Detecting leaked secrets, API keys, credentials, and sensitive files from public repositories in near real-time using the GitHub Events A…☆27Updated 6 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- AI/LLM local model integration for analysis of reconftw results☆84Updated 6 months ago
- Discovering Typo Squatting on your domains!☆79Updated last year
- Passive Web Vulnerability Detection Tool☆37Updated 6 months ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆78Updated 7 months ago
- Pentest/Red Team: Resources, repos and scripts.☆78Updated 2 weeks ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆60Updated 5 months ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Updated 2 years ago
- External recon toolkit☆53Updated 11 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆40Updated 7 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- ☆79Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- ☆19Updated 2 years ago
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆17Updated last year
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Updated last year
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Updated 4 months ago