Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy services.
☆2,109Jan 6, 2026Updated 2 months ago
Alternatives and similar repositories for CloakQuest3r
Users that are interested in CloakQuest3r are comparing it to the libraries listed below
Sorting:
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆173Jan 6, 2026Updated 2 months ago
- Tool designed for fetching, validating, and storing working proxies.☆259Nov 20, 2025Updated 3 months ago
- Omnisci3nt is an open-source web reconnaissance and intelligence tool for extracting deep technical insights from domains, including subd…☆338Jan 6, 2026Updated 2 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,932Oct 4, 2025Updated 5 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,823Aug 20, 2025Updated 6 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆732Jan 25, 2026Updated last month
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information.☆1,304Jan 6, 2026Updated 2 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆264Jul 6, 2025Updated 8 months ago
- Open-source URL masking & analysis tool for security research, phishing awareness, and defensive testing. Demonstrates adversary techniqu…☆474Jan 6, 2026Updated 2 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,304Updated this week
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆663May 10, 2025Updated 9 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆985Jan 12, 2024Updated 2 years ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,267Jul 18, 2024Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆311Mar 31, 2024Updated last year
- A simple tool for bypassing file upload restrictions.☆893Jul 22, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,166Mar 28, 2025Updated 11 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,546Updated this week
- The Network Execution Tool☆5,315Updated this week
- An XSS exploitation command-line interface and payload generator.☆1,415Jan 19, 2025Updated last year
- The recursive internet scanner for hackers. 🧡☆9,468Updated this week
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆733Mar 21, 2024Updated last year
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆936Aug 24, 2023Updated 2 years ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆74Jan 6, 2026Updated 2 months ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆988Apr 6, 2024Updated last year
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,270Feb 10, 2024Updated 2 years ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆788Jan 9, 2025Updated last year
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,381Mar 2, 2026Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,773May 22, 2024Updated last year
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,552Updated this week
- skytrack is a planespotting and aircraft OSINT tool made using Python 🛩🔍☆501Dec 19, 2023Updated 2 years ago
- A reconnaissance framework for researching and investigating Telegram.☆1,285Jul 11, 2024Updated last year
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,961Jul 12, 2024Updated last year
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,426Jul 14, 2025Updated 7 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Jan 7, 2024Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites…☆1,540Sep 1, 2023Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,642Mar 2, 2026Updated last week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,158Updated this week