CF GeoBypasser Cyberpunk Framework is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based Geo-restrictions using country-specific proxies
☆54Dec 10, 2025Updated 4 months ago
Alternatives and similar repositories for CF-GeoBypasser-Cyberpunk-Framework
Users that are interested in CF-GeoBypasser-Cyberpunk-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆28Oct 20, 2025Updated 5 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- X-brute is a tool designed to perform brute force using auto tor to trick the system so that it can continue to run and perform brute for…☆21Jan 7, 2026Updated 3 months ago
- Simple Web CLI Web UI Interface☆33Feb 1, 2026Updated 2 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- AI-powered transcription for audio & video with Whisper — self-hosted, fast, and open-source.☆110Mar 18, 2026Updated last month
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- Adversary Simulation Framework☆40Aug 19, 2025Updated 7 months ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- Disk space analyzer with historical tracking.☆51Mar 30, 2026Updated 2 weeks ago
- AndroidSubSystem4GNU/Linux☆40Dec 30, 2025Updated 3 months ago
- Red Teaming Tactics and Techniques☆12Feb 10, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Splice and merge videos from the terminal☆25Oct 4, 2025Updated 6 months ago
- lazyfile: terminal UI for browsing cloud storage via rclone☆45Mar 7, 2026Updated last month
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆49Dec 18, 2024Updated last year
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 4 months ago
- LLamaHTML is a simple html file to communicate with a running llamacpp llama-server☆23Aug 5, 2025Updated 8 months ago
- A sophisticated RAG (Retrieval-Augmented Generation) Telegram bot that transforms articles and documents into interactive knowledge bases…☆53Oct 6, 2025Updated 6 months ago
- 2026 DIY Opt-Out Manual For Removal From Over 400 Sites. The guide shows difficulty rating, an estimate of how long it will take, and …☆47Mar 29, 2026Updated 3 weeks ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- Who We Are☆22Sep 6, 2024Updated last year
- A powerful shell script tool for managing multiple SSH tunnels concurrently.☆12Jun 15, 2023Updated 2 years ago
- A fairly lightweight daemon that keeps your computer awake. Designed for rootless environments.☆24May 3, 2019Updated 6 years ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆55May 1, 2025Updated 11 months ago
- A framework for writing window managers in familiar HTML, JS, and CSS.☆42Nov 29, 2025Updated 4 months ago
- Space theme for KDE☆25Dec 18, 2024Updated last year
- A cyber security toolkit blending manual testing with AI Agents☆122Apr 7, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- Manage automatically SOCKS5 tunnel created with tun2socks☆10Apr 23, 2022Updated 3 years ago
- A simple HTTP server that wraps an unofficial free WhatsApp API.☆15Aug 19, 2025Updated 8 months ago
- Detection: Identify the presence of the Ploutus malware by checking for known indicators of compromise (IoCs) such as specific files, reg…☆11Sep 5, 2024Updated last year
- Intercept Facebook network traffic on Android device☆16Apr 9, 2026Updated last week
- Simple Python web server for HTTP request and browser fingerprinting with whitelist and callback functionality.☆25Apr 18, 2023Updated 3 years ago