Unleash the power of cloud
☆817Nov 19, 2024Updated last year
Alternatives and similar repositories for ShadowClone
Users that are interested in ShadowClone are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆269Feb 5, 2026Updated 2 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,821May 22, 2024Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,372Sep 30, 2024Updated last year
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,471Jul 14, 2025Updated 9 months ago
- Hidden parameters discovery suite☆2,050Sep 8, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆845Mar 24, 2026Updated last month
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,339Aug 7, 2025Updated 8 months ago
- IIS shortname scanner written in Go☆355Mar 25, 2023Updated 3 years ago
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,368Apr 23, 2026Updated last week
- An IIS short filename enumeration tool☆1,146Nov 25, 2024Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,543Mar 8, 2026Updated last month
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,042Aug 23, 2025Updated 8 months ago
- ☆522Apr 29, 2024Updated 2 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆514Jul 17, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,076Mar 24, 2026Updated last month
- CT Log Scanner☆534Dec 26, 2025Updated 4 months ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,618Mar 8, 2026Updated last month
- AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation☆2,241Apr 3, 2023Updated 3 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,511Jan 8, 2026Updated 3 months ago
- Rust-based high performance domain permutation generator.☆299Dec 2, 2023Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆756Dec 19, 2023Updated 2 years ago
- ☆154Aug 18, 2023Updated 2 years ago
- Obtain GraphQL API schema even if the introspection is disabled☆1,440Dec 5, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆641Jul 7, 2025Updated 9 months ago
- ☆144Mar 10, 2026Updated last month
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,163Feb 23, 2026Updated 2 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆300Oct 5, 2024Updated last year
- Black box fuzzer for web applications☆437Jul 20, 2025Updated 9 months ago
- Distribute ordinary bash commands over many systems☆167Aug 29, 2022Updated 3 years ago
- Rockyou for web fuzzing☆3,141Mar 11, 2026Updated last month
- declutters url lists for crawling/pentesting☆1,551Feb 23, 2025Updated last year
- The most exhaustive list of reliable DNS resolvers.☆982Apr 24, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆210Jul 11, 2024Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,481Apr 23, 2026Updated last week
- De-clutter a list of URLs☆387Mar 8, 2026Updated last month
- Contextual Content Discovery Tool☆3,158Apr 29, 2024Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆968Dec 31, 2021Updated 4 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆562Mar 8, 2025Updated last year
- Scrape domain names from SSL certificates of arbitrary hosts☆690Mar 31, 2024Updated 2 years ago