alebeta90 / behindflareLinks
This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse proxy and WAF
☆14Updated 2 years ago
Alternatives and similar repositories for behindflare
Users that are interested in behindflare are comparing it to the libraries listed below
Sorting:
- A program to map out SPF and DKIM records for a large number of domains☆39Updated 10 years ago
- Clickjacking PoC Generator☆35Updated 5 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 6 years ago
- fast, zero config web endpoint change monitor☆43Updated 5 years ago
- All the information provided on this site is for educational purposes only.☆18Updated last year
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last month
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- Default plugins for Jaeles Scanner☆35Updated 5 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- bash poc scripts to exploit open fpm ports☆59Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated 5 months ago
- Query various sources for CVE proof-of-concepts☆53Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- ☆49Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆83Updated 7 months ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 3 years ago
- Database to store previously found subdomains☆66Updated 4 months ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Updated 2 years ago
- Plattform to develop and experiment with existing java web attacks.☆31Updated 8 years ago
- WebSocket Connection Smuggler☆47Updated 3 years ago
- Build interactive map of cameras from Shodan☆23Updated 6 years ago
- Static analysis of wordpress plugins☆61Updated 5 years ago
- parse ffuf & map endpoints to wordlists☆21Updated 4 years ago