christophetd / abusing-cloudflare-workers
Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for abusing-cloudflare-workers
- Open YARA scan- and search engine☆16Updated this week
- Fork of https://github.com/PortSwigger/param-miner for header smuggling research☆12Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 3 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆21Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- CloudFlare Worker Shell☆13Updated 4 years ago
- ☆8Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Python CLI and module for CIRCL hash lookup☆12Updated 2 weeks ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆17Updated 2 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- ☆16Updated last year
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Geolocate your files!☆16Updated 2 years ago
- Standardizing Security Titles☆13Updated last year
- Create an AMI with CobaltStrike and related tools.☆8Updated 2 months ago
- A tool to encode and decode content as whitespace☆14Updated last year
- module for certexfil☆15Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 2 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Custom semgrep rules registry☆12Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Modular C2 server to tame your pack of wolves☆12Updated last year
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆18Updated 4 years ago