CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using country-specific proxies
☆54Dec 10, 2025Updated 3 months ago
Alternatives and similar repositories for CF-GeoBypasser-Cyberpunk-Framework
Users that are interested in CF-GeoBypasser-Cyberpunk-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆27Oct 20, 2025Updated 5 months ago
- Sender otp massive on termux☆35Updated this week
- Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.☆48Jan 22, 2026Updated 2 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- X-brute is a tool designed to perform brute force using auto tor to trick the system so that it can continue to run and perform brute for…☆21Jan 7, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Simple Web CLI Web UI Interface☆33Feb 1, 2026Updated last month
- rootless cron scheduler with cmd-socket command☆52May 13, 2025Updated 10 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- AI-powered transcription for audio & video with Whisper — self-hosted, fast, and open-source.☆108Mar 18, 2026Updated last week
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AndroidSubSystem4GNU/Linux☆38Dec 30, 2025Updated 2 months ago
- 2026 DIY Opt-Out Manual For Removal From Over 400 Sites. The guide shows difficulty rating, an estimate of how long it will take, and …☆28Updated this week
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Splice and merge videos from the terminal☆25Oct 4, 2025Updated 5 months ago
- Raptor is a modern, fast, and easy-to-use system for building disk images, bootable isos, containers and much more, from a simple, Docker…☆39Feb 10, 2026Updated last month
- lazyfile: terminal UI for browsing cloud storage via rclone☆43Mar 7, 2026Updated 3 weeks ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- LLamaHTML is a simple html file to communicate with a running llamacpp llama-server☆22Aug 5, 2025Updated 7 months ago
- A sophisticated RAG (Retrieval-Augmented Generation) Telegram bot that transforms articles and documents into interactive knowledge bases…☆53Oct 6, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- a tool that functions to detect scammers based on telephone number analysis from the total number of markers☆81Mar 18, 2026Updated last week
- A undetected Twitter bot using Selenium & Python☆10Aug 5, 2021Updated 4 years ago
- Argument injection vulnerability in PHP☆13Jun 15, 2024Updated last year
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆43Dec 4, 2025Updated 3 months ago
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- A fairly lightweight daemon that keeps your computer awake. Designed for rootless environments.☆23May 3, 2019Updated 6 years ago
- Who We Are☆22Sep 6, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A powerful shell script tool for managing multiple SSH tunnels concurrently.☆12Jun 15, 2023Updated 2 years ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 8 months ago
- Black Hat Ethical Hacking - Official Theme for Conky Manager☆18Sep 6, 2024Updated last year
- A cyber security toolkit blending manual testing with AI Agents☆114Updated this week
- A framework for writing window managers in familiar HTML, JS, and CSS.☆42Nov 29, 2025Updated 4 months ago
- Yet another directory buster☆53Feb 24, 2026Updated last month
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago