christophetd / abusing-cloudflare-workers
Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.
☆15Updated 2 years ago
Alternatives and similar repositories for abusing-cloudflare-workers:
Users that are interested in abusing-cloudflare-workers are comparing it to the libraries listed below
- ☆17Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Open YARA scan- and search engine☆21Updated 3 weeks ago
- CloudFlare Worker Shell☆14Updated 4 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Create an AMI with CobaltStrike and related tools.☆8Updated this week
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆20Updated 2 years ago
- the puppy proxy☆22Updated 4 years ago
- Geolocate your files!☆16Updated 3 years ago
- A command based package for simple display of statistics☆22Updated 3 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- OpenSSF Project Template☆17Updated last year
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated 4 months ago
- Fuzz Network Traffic☆18Updated 2 months ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Modular C2 server to tame your pack of wolves☆11Updated last year
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- dev level ;-)☆10Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 2 years ago
- A tool to run a command when the target of a symlink changes☆16Updated 8 years ago
- A CLI tool and library allowing to simply decode all kind of BigIP cookies.☆11Updated last month