hackermondev / cf-teleportLinks
Tool to teleport your HTTP requests to different Cloudflare datacenters.
☆137Updated 7 months ago
Alternatives and similar repositories for cf-teleport
Users that are interested in cf-teleport are comparing it to the libraries listed below
Sorting:
- Tool for reversing Google internal protobuf definitions☆143Updated 3 months ago
- the blazing-fast pentesting suite.☆251Updated 4 months ago
- Tool for recovering the phone number tied to a Google account☆104Updated 2 months ago
- A tool to dump exposed .git repositories☆71Updated 2 months ago
- TLDR 2 (TLD Records 2) is a continually updated DNS archive of zone transfer attempts against all existing TLD nameservers as well as the…☆72Updated this week
- Hides message with invisible Unicode characters☆94Updated 11 months ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆27Updated 11 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆128Updated 3 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆94Updated this week
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆17Updated 10 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆185Updated 3 months ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆340Updated last year
- Discover and enumerate all subdomains associated with a website, including those not publicly advertised. Use this tool to conduct thorou…☆139Updated 10 months ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆177Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆233Updated 6 months ago
- Security advisories for vulnerabilities☆72Updated 7 months ago
- Scan for secrets in dangling commits on GitHub using GH Archive data.☆343Updated last month
- Embed a ZIP or JAR file within a PNG image to create a tweetable and "executable" PNG-ZIP/JAR polyglot.☆36Updated last week
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆107Updated last month
- An ssh honeypot with the XZ backdoor. CVE-2024-3094☆144Updated last year
- Drill into WARC web archives☆140Updated 10 months ago
- A lightweight extension to automatically detect and provide verbose warnings for embedded iframe elements in order to protect against Bro…☆47Updated 2 years ago
- A library for intercepting system calls☆101Updated 7 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆75Updated 4 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆370Updated last month
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆67Updated this week
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Updated 2 years ago
- WMI virus, because funny☆293Updated 7 months ago
- ROT26 encryption, twice as secure as ROT13☆59Updated 7 months ago