Check IP addresses against known cloud provider IP address ranges
☆47Feb 7, 2026Updated last month
Alternatives and similar repositories for ip2cloud
Users that are interested in ip2cloud are comparing it to the libraries listed below
Sorting:
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆117Feb 23, 2026Updated 3 weeks ago
- Tools for bug bounty☆29Jul 9, 2025Updated 8 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated last month
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Feb 3, 2024Updated 2 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆28Mar 20, 2024Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆27Mar 31, 2025Updated 11 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- PoC for XSS in org.webjars:swagger-ui [3.14.2, 3.36.2]☆51Feb 17, 2023Updated 3 years ago
- Bypass 403 pages☆130Jun 30, 2024Updated last year
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- A utility for recursively traversing SSL/TLS certificates for collecting DNS names☆48Aug 26, 2023Updated 2 years ago
- 一款由golang编写的高并发且不会漏报的ssh爆破工具☆30Jun 28, 2022Updated 3 years ago
- Scan any HackerOne program with Nuclei☆14Sep 21, 2021Updated 4 years ago
- ☆22Apr 30, 2023Updated 2 years ago
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆70Sep 25, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 2 years ago
- OWASP Foundation Web Respository☆26Oct 11, 2025Updated 5 months ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- Bruteforces Fortinet SSL VPNs☆58Sep 19, 2023Updated 2 years ago
- Collection of Stuff☆14Nov 2, 2023Updated 2 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆18Aug 31, 2018Updated 7 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Apr 23, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago