christophetd / abusing-cloudflare-workers
Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.
☆16Updated 2 years ago
Alternatives and similar repositories for abusing-cloudflare-workers:
Users that are interested in abusing-cloudflare-workers are comparing it to the libraries listed below
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Fuzz Network Traffic☆18Updated 4 months ago
- CloudFlare Worker Shell☆14Updated 4 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- ☆17Updated last year
- Geolocate your files!☆16Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- A command based package for simple display of statistics☆22Updated 5 months ago
- vyos based isolation of networks☆10Updated 4 years ago
- Create an AMI with CobaltStrike and related tools.☆10Updated 3 weeks ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated 6 months ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last week
- Python framework for manipulating bulk WHOIS data from RIRs☆21Updated 3 years ago
- ☆16Updated last week
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- the puppy proxy☆22Updated 4 years ago
- Open YARA scan- and search engine☆23Updated 2 months ago
- Collection of Windows Driver Utils☆11Updated last year
- OpenSSF Project Template☆18Updated last year
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- Strategy for building a Red Team☆17Updated last year
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated 2 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆15Updated 2 years ago