A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.
☆368Dec 5, 2025Updated 4 months ago
Alternatives and similar repositories for CloudRip
Users that are interested in CloudRip are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated last month
- ☆57Nov 18, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆66Feb 23, 2026Updated last month
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- Generate backdoored RSA keys using SETUP☆236Dec 1, 2025Updated 4 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆119Oct 30, 2025Updated 5 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆396Feb 24, 2026Updated last month
- 0xJS is an AI-powered JavaScript Security Tool☆53Mar 1, 2026Updated last month
- Living of the Land of Free SaaS☆69Mar 22, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 6 months ago
- Chrome extension for capturing API calls☆41Updated this week
- ☆32Jan 16, 2026Updated 2 months ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆39Jul 27, 2024Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆69Mar 17, 2025Updated last year
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 3 months ago
- ☆96Apr 3, 2025Updated last year
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 6 months ago
- ☆41Sep 25, 2025Updated 6 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated last month
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆257Dec 16, 2025Updated 3 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 10 months ago
- collection of some script i use to make life easier☆27Dec 28, 2025Updated 3 months ago
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆252Mar 26, 2026Updated 2 weeks ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆285Updated this week
- 🌩Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications☆20Oct 16, 2024Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆481Mar 15, 2026Updated 3 weeks ago
- ☆67Jan 16, 2025Updated last year
- An open-source, C#-based remote administration tool (RAT), enabling complete control of a remote Windows machine, designed for legitimate…☆181Updated this week
- # Keylogger-BOF☆45Mar 13, 2026Updated 3 weeks ago