musana / CF-HeroView external linksLinks
CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications
☆1,775Jun 15, 2025Updated 8 months ago
Alternatives and similar repositories for CF-Hero
Users that are interested in CF-Hero are comparing it to the libraries listed below
Sorting:
- AI-powered ffuf wrapper☆644Dec 4, 2025Updated 2 months ago
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,095Jan 6, 2026Updated last month
- ☆761May 7, 2025Updated 9 months ago
- A fast WordPress plugin enumeration tool☆769Feb 8, 2026Updated last week
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,697Feb 8, 2026Updated last week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Nov 12, 2025Updated 3 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,417Jul 14, 2025Updated 7 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,895Oct 4, 2025Updated 4 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,064Jul 6, 2025Updated 7 months ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,515Dec 7, 2025Updated 2 months ago
- Header Exploitation HTTP☆706Feb 5, 2026Updated last week
- ☆618Feb 5, 2026Updated last week
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆481Jan 22, 2026Updated 3 weeks ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,533Feb 7, 2026Updated last week
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆845Jan 5, 2026Updated last month
- Abuse trust-boundaries to bypass firewalls and network controls☆385Jul 24, 2025Updated 6 months ago
- The Network Execution Tool☆5,250Feb 8, 2026Updated last week
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆568May 22, 2025Updated 8 months ago
- The recursive internet scanner for hackers. 🧡☆9,415Updated this week
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,515Jan 15, 2026Updated last month
- The Most Advanced Client-Side Prototype Pollution Scanner☆245Feb 3, 2026Updated last week
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,097Updated this week
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,495Jan 8, 2026Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,401Jan 19, 2026Updated 3 weeks ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆845Mar 5, 2025Updated 11 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,816Aug 20, 2025Updated 5 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆719Dec 26, 2025Updated last month
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- how to look for Leaked Credentials !☆1,031May 6, 2024Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆719Feb 3, 2026Updated last week
- ☆233Mar 13, 2025Updated 11 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,755May 22, 2024Updated last year
- The Havoc Framework☆8,158Dec 18, 2025Updated last month
- CT Log Scanner☆513Dec 26, 2025Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,490Feb 5, 2026Updated last week
- Scans remote JavaScript files with Trufflehog + Semgrep to detect leaked secrets☆133Jan 21, 2025Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆306Jul 18, 2025Updated 6 months ago
- An IIS short filename enumeration tool☆1,109Nov 25, 2024Updated last year
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆402Dec 22, 2025Updated last month