A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.
☆348Dec 5, 2025Updated 3 months ago
Alternatives and similar repositories for CloudRip
Users that are interested in CloudRip are comparing it to the libraries listed below
Sorting:
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- ☆57Nov 18, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆66Feb 23, 2026Updated 3 weeks ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- Generate backdoored RSA keys using SETUP☆235Dec 1, 2025Updated 3 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆132May 12, 2025Updated 10 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- ☆30Jan 16, 2026Updated 2 months ago
- this is a tool to detect the Web service is ok or not☆23Oct 14, 2020Updated 5 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 5 months ago
- Chrome extension for capturing API calls☆39Jan 2, 2026Updated 2 months ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆37Jul 27, 2024Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 9 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆387Feb 24, 2026Updated 3 weeks ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 2 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- ☆96Apr 3, 2025Updated 11 months ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 6 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year
- ☆39Sep 25, 2025Updated 5 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆90Feb 16, 2026Updated last month
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆252Dec 16, 2025Updated 3 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 9 months ago
- collection of some script i use to make life easier☆27Dec 28, 2025Updated 2 months ago
- Collection of BOFs created for red team/adversary emulation engagements. Created to be small and interchangeable, for quick recon or even…☆265Mar 11, 2026Updated last week
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆23Sep 20, 2025Updated 6 months ago
- 🌩Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications☆20Oct 16, 2024Updated last year
- An open-source, C#-based remote administration tool (RAT), enabling complete control of a remote Windows machine, designed for legitimate…☆174Updated this week
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆471Updated this week
- # Keylogger-BOF☆37Mar 13, 2026Updated last week
- ☆68Jan 16, 2025Updated last year
- A tool for hacking into publicly exposed network cameras, with support for specifying country and region.☆539Mar 8, 2026Updated last week