Bypass Coudflare bot protection using Cloudflare Workers
☆788Jul 27, 2021Updated 4 years ago
Alternatives and similar repositories for cloudflare-bypass
Users that are interested in cloudflare-bypass are comparing it to the libraries listed below
Sorting:
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆828Jun 12, 2021Updated 4 years ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- ☆2,511Jan 2, 2023Updated 3 years ago
- c++ fully undetected shellcode launcher ;)☆980Jun 11, 2021Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,447Dec 18, 2022Updated 3 years ago
- A tool for generating fake code signing certificates or signing real ones☆961Apr 17, 2023Updated 2 years ago
- ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)☆327Mar 9, 2022Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆235May 20, 2021Updated 4 years ago
- ☆1,455Jan 23, 2024Updated 2 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- 🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.☆2,940May 1, 2025Updated 10 months ago
- ☆705Nov 27, 2024Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,663Jan 23, 2025Updated last year
- Cloudflare, Sucuri, Incapsula real IP tracker.☆1,768Jul 25, 2023Updated 2 years ago
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀☆659Aug 28, 2025Updated 6 months ago
- PowerShell Script Obfuscator☆596Nov 2, 2023Updated 2 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,876Aug 18, 2023Updated 2 years ago
- The Swiss Army knife for automated Web Application Testing☆2,323May 8, 2024Updated last year
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆606Mar 19, 2022Updated 3 years ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆782May 10, 2022Updated 3 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,217Feb 3, 2025Updated last year
- This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.☆74Nov 5, 2020Updated 5 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆290Mar 8, 2023Updated 3 years ago
- A versatile and portable proxy for capturing, manipulating, and replaying HTTP/HTTPS traffic on the go.☆2,988Feb 23, 2026Updated 2 weeks ago
- We publish our challenge questions for everyone.☆93Mar 15, 2021Updated 4 years ago
- Scanning APK file for URIs, endpoints & secrets.☆5,982Aug 20, 2025Updated 6 months ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,553Updated this week
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆705Oct 29, 2021Updated 4 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago