musana / CF-Hero
CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications
☆703Updated 3 weeks ago
Alternatives and similar repositories for CF-Hero:
Users that are interested in CF-Hero are comparing it to the libraries listed below
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆315Updated last month
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆493Updated this week
- Galah: An LLM-powered web honeypot.☆461Updated 3 months ago
- the blazing-fast pentesting suite.☆215Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,111Updated 2 months ago
- Agentic LLM Vulnerability Scanner / AI red teaming kit 🧪☆947Updated this week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆507Updated 3 weeks ago
- An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome and…☆1,419Updated last week
- Fetch an entire site and save it as a text file (to be used with AI models).☆625Updated last week
- DarkFlare Firewall Piercing (TCP over CDN)☆1,217Updated 3 weeks ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆256Updated this week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆242Updated this week
- Make BASH stealthy and hacker friendly with lots of bash functions☆230Updated last week
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆205Updated 2 months ago
- Tunnel TCP connections through a file☆912Updated last week
- Header Exploitation HTTP☆322Updated this week
- Multi-services Asynchronous Honeypot Solution with real-time threat detection☆81Updated last week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆93Updated last month
- A high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features cus…☆384Updated 3 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆369Updated 3 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆968Updated this week
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆111Updated this week
- Burp Suite extension that mutates ciphers to bypass TLS-fingerprint based bot detection☆272Updated 2 weeks ago
- A repository of credential stealer formats☆169Updated last week
- MacOS S☆164Updated 2 months ago
- Using Agents To Automate Pentesting☆193Updated last week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆207Updated this week
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆94Updated last week
- Open Breach and Attack Simulation Platform☆814Updated this week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆349Updated 9 months ago