musana / CF-HeroLinks
CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications
☆1,736Updated 4 months ago
Alternatives and similar repositories for CF-Hero
Users that are interested in CF-Hero are comparing it to the libraries listed below
Sorting:
- Uncover the true IP address of websites safeguarded by Cloudflare & Others☆1,952Updated 5 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆727Updated this week
- Autoswagger by Intruder - detect API auth weaknesses☆1,545Updated 2 months ago
- Header Exploitation HTTP☆662Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,169Updated last week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,258Updated last year
- A fast WordPress plugin enumeration tool☆694Updated 2 months ago
- secator - the pentester's swiss knife☆1,151Updated last week
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆454Updated last month
- how to look for Leaked Credentials !☆990Updated last year
- A curated list of tools officially presented at Black Hat events☆695Updated 3 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,722Updated 2 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,330Updated 3 months ago
- 🚀 Caido releases, wiki and roadmap☆1,875Updated last week
- Go CLI and Library for quickly mapping organization network ranges using ASN information.☆951Updated last week
- ☆740Updated last week
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,213Updated 4 months ago
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,598Updated 3 weeks ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆677Updated 5 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,727Updated 2 weeks ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,118Updated last week
- Check your WAF before an attacker does☆1,434Updated 3 months ago
- ☆2,100Updated 2 weeks ago
- 60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒☆1,119Updated this week
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆922Updated this week
- Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more☆2,810Updated 2 weeks ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,380Updated last month
- The Ultimate Information Gathering Toolkit☆2,369Updated this week
- The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷☆1,747Updated last month
- All-in-one offensive security toolbox with AI agent and MCP architecture. Integrates tools like Nmap, Metasploit, FFUF, SQLMap. Enables p…☆434Updated 4 months ago