musana / CF-Hero
CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications
☆719Updated 2 months ago
Alternatives and similar repositories for CF-Hero:
Users that are interested in CF-Hero are comparing it to the libraries listed below
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆533Updated last week
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆334Updated 2 months ago
- Python tool designed to identify misconfigured DMARC and SPF settings in domains. It resolves DNS records, checks for DMARC policies, SPF…☆109Updated 2 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆316Updated last week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,125Updated 3 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆217Updated 3 weeks ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆542Updated this week
- Header Exploitation HTTP☆448Updated last month
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆726Updated last month
- Fetch an entire site and save it as a text file (to be used with AI models).☆1,155Updated last month
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆292Updated last week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆299Updated this week
- the blazing-fast pentesting suite.☆219Updated 3 months ago
- DarkFlare Firewall Piercing (TCP over CDN)☆1,258Updated last month
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆100Updated 3 months ago
- An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome and…☆1,504Updated last week
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆560Updated 2 weeks ago
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆166Updated 8 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆272Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆236Updated this week
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆848Updated 2 weeks ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆333Updated last year
- Fast Real-time Object Detection with High-Res Output https://x.com/_akhaliq/status/1840213012818329826 https://x.com/githubprojects/statu…☆515Updated 5 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆129Updated 2 weeks ago
- Galah: An LLM-powered web honeypot.☆496Updated 4 months ago
- APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and …☆310Updated 3 months ago
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆105Updated this week
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆371Updated last month