zidansec / CloudPelerView external linksLinks
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
β1,532Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for CloudPeler
Users that are interested in CloudPeler are comparing it to the libraries listed below
Sorting:
- π Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.β2,933May 1, 2025Updated 9 months ago
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy serviβ¦β2,095Jan 6, 2026Updated last month
- Cloudflare, Sucuri, Incapsula real IP tracker.β1,763Jul 25, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β975Jan 12, 2024Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.β1,415Jan 19, 2025Updated last year
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.β38Aug 9, 2023Updated 2 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare networkβ2,507Mar 26, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,149Feb 9, 2026Updated last week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,192Updated this week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,895Oct 4, 2025Updated 4 months ago
- Generates millions of keyword-based password mutations in seconds.β1,407Jun 8, 2025Updated 8 months ago
- The recursive internet scanner for hackers. π§‘β9,415Updated this week
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without lβ¦β1,552Dec 21, 2025Updated last month
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Reβ¦β1,816Aug 20, 2025Updated 5 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secretsβ1,515Jan 15, 2026Updated last month
- Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies foβ¦β1,269Sep 5, 2022Updated 3 years ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,β732Mar 21, 2024Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.β2,824Jan 7, 2026Updated last month
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs β¦β258Apr 3, 2025Updated 10 months ago
- Check your WAF before an attacker doesβ1,462Jul 17, 2025Updated 6 months ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.β1,155Mar 30, 2023Updated 2 years ago
- E4GL30S1NT - Simple Information Gathering Toolβ663Jun 8, 2025Updated 8 months ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,835Updated this week
- A simple script just made for self use for bypassing 403β2,029May 30, 2024Updated last year
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,490Feb 5, 2026Updated last week
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a β¦β674Dec 8, 2025Updated 2 months ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanningβ524Jul 5, 2023Updated 2 years ago
- bypass-url-parserβ1,111Feb 7, 2026Updated last week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β4,331May 21, 2025Updated 8 months ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!β2,533Feb 7, 2026Updated last week
- In-depth attack surface mapping and asset discoveryβ14,103Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β8,464Nov 16, 2025Updated 3 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,413Jan 19, 2025Updated last year
- A simple tool for bypassing file upload restrictions.β892Jul 22, 2024Updated last year
- Real-world infosec wordlists, updated regularlyβ1,632Updated this week
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters andβ¦β800Jul 4, 2023Updated 2 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomainβ¦β886May 3, 2023Updated 2 years ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.β1,581Mar 4, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDRβ3,143Mar 28, 2025Updated 10 months ago