k4m4 / cloudflare-detect
Detect whether a site is running behind Cloudflare.
☆24Updated 8 months ago
Alternatives and similar repositories for cloudflare-detect:
Users that are interested in cloudflare-detect are comparing it to the libraries listed below
- Retrieve an array of possible hash types corresponding to a given string.☆18Updated 2 years ago
- Detect whether an IP address belongs to a Tor exit node.☆23Updated 2 years ago
- DirBuster for Node.js☆20Updated 5 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- Multi-client, multi-threaded reverse shell handler written in Node.js☆74Updated 2 years ago
- Blacklist ip addresses caught scanning or bruteforcing hosts☆20Updated 6 years ago
- As per PCI Compliance. Server should not have Remote MySQL enabled. This tools proves them right☆9Updated 3 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆122Updated 7 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆27Updated 2 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54Updated 3 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- Subdomain Scanner Tools with word-lists☆23Updated 5 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 9 years ago
- Fast browser-based network discovery module☆114Updated 3 years ago