Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The check is carried out based on five criteria: 3 headers in the HTTP response, IP, and SSL certificate issuer.
☆17Mar 30, 2023Updated 2 years ago
Alternatives and similar repositories for cfd
Users that are interested in cfd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- A script to enumerate valid usernames based on the requests response times.☆23May 3, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated last month
- Tools used for Pentesting☆22Apr 21, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- vhost scanning☆37Nov 1, 2023Updated 2 years ago
- sonarbyte is a simple and fast subdomain scanner written in go to extract subdomain from Rapid7's DNS Database using omnisint's api.☆27Sep 4, 2022Updated 3 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆88Dec 29, 2023Updated 2 years ago
- A Selenium scraper for public domain search tools.☆18Oct 27, 2024Updated last year
- Still point in moving world.☆49Oct 6, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- This is a collection of wordlists depending upon use cases☆10Jul 27, 2023Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Archive des épreuves du FCSC 2022 en attendant une version officielle de l'ANSSI☆10Jun 11, 2022Updated 3 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- Tools that can be useful for OSEP exam and PEN300 studies.☆73Mar 14, 2026Updated last week
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- ☆48Nov 14, 2021Updated 4 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Red Team Guides☆145Jan 3, 2024Updated 2 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Proof of concept/experimental detection of Discord Nitro phishing links via image analyzation☆10Jan 18, 2022Updated 4 years ago
- A VS Code extension to preview XML nmap output☆43Feb 20, 2025Updated last year
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Oct 22, 2020Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago