alebeta90 / behindflare
This tool was created as a Proof of Concept to reveal the threats related to web service misconfiguration using CloudFlare as reverse proxy and WAF
☆15Updated 2 years ago
Alternatives and similar repositories for behindflare:
Users that are interested in behindflare are comparing it to the libraries listed below
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 11 months ago
- Magento Security Scanner☆15Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- parse ffuf & map endpoints to wordlists☆20Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆26Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- ShellC0de Generator☆11Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆14Updated 2 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- Noob Penetration tester☆11Updated 11 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Query various sources for CVE proof-of-concepts☆51Updated last year
- ☆47Updated 4 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆14Updated last year
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- A rogue DNS detector☆23Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆17Updated 4 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30Updated 4 years ago