Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The check is carried out based on five criteria: 3 headers in the HTTP response, IP, and SSL certificate issuer.
☆17Mar 30, 2023Updated 3 years ago
Alternatives and similar repositories for cfd
Users that are interested in cfd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Apr 2, 2026Updated last month
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- A script to enumerate valid usernames based on the requests response times.☆24May 3, 2022Updated 4 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Tools used for Pentesting☆22Apr 21, 2023Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 3 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- vhost scanning☆38Nov 1, 2023Updated 2 years ago
- sonarbyte is a simple and fast subdomain scanner written in go to extract subdomain from Rapid7's DNS Database using omnisint's api.☆27Sep 4, 2022Updated 3 years ago
- IDA (sort of) headless☆28Feb 17, 2024Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 3 months ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- A Selenium scraper for public domain search tools.☆18Oct 27, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Still point in moving world.☆49Oct 6, 2022Updated 3 years ago
- HTTP Headers Security Cheat Sheet☆13Sep 25, 2021Updated 4 years ago
- This is a collection of wordlists depending upon use cases☆10Jul 27, 2023Updated 2 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- ☆48Nov 14, 2021Updated 4 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Red Team Guides☆146Jan 3, 2024Updated 2 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 3 years ago
- Proof of concept/experimental detection of Discord Nitro phishing links via image analyzation☆10Jan 18, 2022Updated 4 years ago
- A VS Code extension to preview XML nmap output☆43Apr 2, 2026Updated last month
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆22May 23, 2024Updated last year
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆16Oct 22, 2020Updated 5 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- A privacy focused, Chromium browser for web scraping. Built with Tor and PySide6 (a QT framework).☆10Mar 13, 2023Updated 3 years ago