Bypass Coudflare bot protection using Cloudflare Workers
☆788Jul 27, 2021Updated 4 years ago
Alternatives and similar repositories for cloudflare-bypass
Users that are interested in cloudflare-bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆830Jun 12, 2021Updated 4 years ago
- A tool for generating fake code signing certificates or signing real ones☆970Apr 17, 2023Updated 2 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 4 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- ☆2,516Jan 2, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Mar 9, 2022Updated 4 years ago
- c++ fully undetected shellcode launcher ;)☆980Jun 11, 2021Updated 4 years ago
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- Cloudflare, Sucuri, Incapsula real IP tracker.☆1,774Jul 25, 2023Updated 2 years ago
- 🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.☆2,946May 1, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- ☆705Nov 27, 2024Updated last year
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆785May 10, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆992Oct 7, 2022Updated 3 years ago
- PowerShell Script Obfuscator☆599Nov 2, 2023Updated 2 years ago
- The Swiss Army knife for automated Web Application Testing☆2,324May 8, 2024Updated last year
- This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.☆75Nov 5, 2020Updated 5 years ago
- Scanning APK file for URIs, endpoints & secrets.☆6,024Aug 20, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.☆321Jul 1, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆720Aug 17, 2021Updated 4 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆605Mar 19, 2022Updated 4 years ago
- A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀☆660Aug 28, 2025Updated 7 months ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,662Jan 23, 2025Updated last year
- A .NET tool for exporting and importing certificates without touching disk.☆502Oct 8, 2021Updated 4 years ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆3,005Feb 23, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- We publish our challenge questions for everyone.☆93Mar 15, 2021Updated 5 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,218Feb 3, 2025Updated last year
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- A tool to kill antimalware protected processes☆1,506Jun 19, 2021Updated 4 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆290Mar 8, 2023Updated 3 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆703Oct 29, 2021Updated 4 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago