A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.
☆376Dec 5, 2025Updated 5 months ago
Alternatives and similar repositories for CloudRip
Users that are interested in CloudRip are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- ☆57Nov 18, 2025Updated 5 months ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆32Dec 18, 2025Updated 4 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆67Feb 23, 2026Updated 2 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Generate backdoored RSA keys using SETUP☆236Dec 1, 2025Updated 5 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- this is a tool to detect the Web service is ok or not☆24Oct 14, 2020Updated 5 years ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆399Feb 24, 2026Updated 2 months ago
- 0xJS is an AI-powered JavaScript Security Tool☆57Apr 16, 2026Updated 2 weeks ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆48Oct 3, 2025Updated 7 months ago
- Chrome extension for capturing API calls☆41Apr 6, 2026Updated 3 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆44Jul 27, 2024Updated last year
- how hackers Hackers can exploit SS7 vulnerabilities to intercept phone calls, SMS messages, and even track the real-time location of a ph…☆35Jan 11, 2025Updated last year
- ☆33Jan 16, 2026Updated 3 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Living of the Land of Free SaaS☆72Mar 22, 2026Updated last month
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆34Apr 28, 2025Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆70Mar 17, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 7 months ago
- ☆95Apr 3, 2025Updated last year
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 7 months ago
- BurpSuite extensions -Bypass Suite☆26Jul 19, 2024Updated last year
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆92Feb 16, 2026Updated 2 months ago
- ☆16Apr 17, 2025Updated last year
- ☆44Sep 25, 2025Updated 7 months ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆260Dec 16, 2025Updated 4 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- collection of some script i use to make life easier☆27Dec 28, 2025Updated 4 months ago
- ☆303Apr 8, 2026Updated 3 weeks ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆108Apr 16, 2026Updated 2 weeks ago
- 🌩Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications☆20Oct 16, 2024Updated last year
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆291Apr 26, 2026Updated last week
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆487Mar 15, 2026Updated last month