musana / CF-HeroLinks
CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications
☆1,751Updated 6 months ago
Alternatives and similar repositories for CF-Hero
Users that are interested in CF-Hero are comparing it to the libraries listed below
Sorting:
- Uncover the true IP address of websites safeguarded by Cloudflare & Others☆1,996Updated 7 months ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆818Updated this week
- Autoswagger by Intruder - detect API auth weaknesses☆1,766Updated 4 months ago
- Header Exploitation HTTP☆690Updated 2 weeks ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,388Updated 5 months ago
- A fast WordPress plugin enumeration tool☆745Updated last month
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,200Updated this week
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆466Updated 3 months ago
- 🚀 Caido releases, wiki and roadmap☆1,987Updated last week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,262Updated last year
- secator - the pentester's swiss knife☆1,208Updated this week
- Check your WAF before an attacker does☆1,458Updated 5 months ago
- how to look for Leaked Credentials !☆1,011Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,764Updated 4 months ago
- A curated list of tools officially presented at Black Hat events☆728Updated 5 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,823Updated 2 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,228Updated this week
- Go CLI and Library for quickly mapping organization network ranges using ASN information.☆978Updated this week
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,686Updated 2 months ago
- Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more☆2,910Updated last week
- Latest CVEs with their Proof of Concept exploits.☆1,009Updated last week
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,267Updated 6 months ago
- An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling☆799Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,708Updated last year
- Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.☆1,687Updated this week
- ☆2,441Updated this week
- 60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒☆1,155Updated last week
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,394Updated 5 months ago
- All-in-One Toolkit for BruteForce Attacks☆1,015Updated last year
- Fully autonomous AI hacker to find actual exploits in your web apps. Shannon has achieved a 96.15% success rate on the hint-free, source-…☆1,760Updated this week