m0rtem / CloudFailLinks
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
☆2,386Updated last year
Alternatives and similar repositories for CloudFail
Users that are interested in CloudFail are comparing it to the libraries listed below
Sorting:
- Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies fo…☆1,244Updated 2 years ago
- 🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.☆2,752Updated last month
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,363Updated 3 weeks ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,260Updated last week
- A Tool for Domain Flyovers☆5,783Updated 3 years ago
- File upload vulnerability scanner and exploitation tool.☆3,215Updated last month
- DNS Enumeration Script☆2,800Updated last week
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,492Updated 2 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,418Updated 5 months ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,521Updated last year
- IP lookup by favicon using Shodan☆1,173Updated 4 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,831Updated 3 years ago
- Find web directories without bruteforce☆1,859Updated last year
- Automated NoSQL database enumeration and web application exploitation tool.☆3,090Updated 2 weeks ago
- Subdomain enumeration and information gathering tool☆1,316Updated 2 months ago
- A python script that finds endpoints in JavaScript files☆3,984Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,312Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,338Updated 8 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,178Updated 11 months ago
- Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications…☆1,324Updated 9 months ago
- Subdomain Takeover tool written in Go☆1,979Updated last year
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,628Updated 7 months ago
- Next generation web scanner☆5,927Updated 11 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,711Updated 5 months ago
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,697Updated 9 months ago
- Knock Subdomain Scan☆4,016Updated 3 weeks ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,120Updated 2 weeks ago
- Detect and bypass web application firewalls and protection systems☆2,786Updated 10 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,743Updated last month
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,815Updated 3 years ago