musana / CF-HeroLinks
CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications
☆1,756Updated 7 months ago
Alternatives and similar repositories for CF-Hero
Users that are interested in CF-Hero are comparing it to the libraries listed below
Sorting:
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,076Updated 2 weeks ago
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆832Updated 2 weeks ago
- Autoswagger by Intruder - detect API auth weaknesses☆1,809Updated 5 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆469Updated 3 weeks ago
- ☆946Updated 2 weeks ago
- Header Exploitation HTTP☆698Updated last month
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,396Updated 6 months ago
- secator - the pentester's swiss knife☆1,226Updated this week
- Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more☆3,212Updated last week
- A fast WordPress plugin enumeration tool☆750Updated 3 weeks ago
- 🚀 Caido releases, wiki and roadmap☆2,041Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,276Updated this week
- ☆1,014Updated 2 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,264Updated last year
- A curated list of tools officially presented at Black Hat events☆742Updated 6 months ago
- how to look for Leaked Credentials !☆1,019Updated last year
- rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks☆1,376Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,328Updated this week
- A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting☆1,734Updated 3 months ago
- All-in-One Toolkit for BruteForce Attacks☆1,033Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,807Updated 5 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,714Updated last year
- An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling☆809Updated last year
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆705Updated 3 weeks ago
- Check your WAF before an attacker does☆1,460Updated 6 months ago
- Go CLI and Library for quickly mapping organization network ranges using ASN information.☆986Updated last week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,873Updated 3 months ago
- Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox☆732Updated 2 months ago
- Matkap - hunt down malicious Telegram bots☆888Updated 5 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,277Updated 7 months ago