CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications
☆1,782Jun 15, 2025Updated 8 months ago
Alternatives and similar repositories for CF-Hero
Users that are interested in CF-Hero are comparing it to the libraries listed below
Sorting:
- AI-powered ffuf wrapper☆646Dec 4, 2025Updated 3 months ago
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,109Jan 6, 2026Updated 2 months ago
- ☆771May 7, 2025Updated 10 months ago
- A fast WordPress plugin enumeration tool☆786Mar 3, 2026Updated last week
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,775Updated this week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,317Nov 12, 2025Updated 3 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,932Oct 4, 2025Updated 5 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,426Jul 14, 2025Updated 7 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,067Mar 1, 2026Updated last week
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,528Dec 7, 2025Updated 3 months ago
- Header Exploitation HTTP☆713Mar 2, 2026Updated last week
- ☆620Feb 5, 2026Updated last month
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆495Jan 22, 2026Updated last month
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,552Mar 3, 2026Updated last week
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆851Jan 5, 2026Updated 2 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆391Jul 24, 2025Updated 7 months ago
- The recursive internet scanner for hackers. 🧡☆9,468Updated this week
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆570May 22, 2025Updated 9 months ago
- The Network Execution Tool☆5,315Updated this week
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,530Updated this week
- The Most Advanced Client-Side Prototype Pollution Scanner☆246Feb 3, 2026Updated last month
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,115Updated this week
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,500Jan 8, 2026Updated 2 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,410Jan 19, 2026Updated last month
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆851Feb 25, 2026Updated last week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,823Aug 20, 2025Updated 6 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆724Dec 26, 2025Updated 2 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- how to look for Leaked Credentials !☆1,034May 6, 2024Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆721Feb 28, 2026Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,773May 22, 2024Updated last year
- The Havoc Framework☆8,203Dec 18, 2025Updated 2 months ago
- Automation tool to testing and confirm the xss vulnerability.☆305Jul 18, 2025Updated 7 months ago
- ☆245Mar 13, 2025Updated 11 months ago
- CT Log Scanner☆516Dec 26, 2025Updated 2 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆404Dec 22, 2025Updated 2 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,546Updated this week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆985Jan 12, 2024Updated 2 years ago
- An IIS short filename enumeration tool☆1,127Nov 25, 2024Updated last year