CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
β1,540Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for CloudPeler
Users that are interested in CloudPeler are comparing it to the libraries listed below
Sorting:
- π Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.β2,940May 1, 2025Updated 10 months ago
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy serviβ¦β2,109Jan 6, 2026Updated 2 months ago
- Cloudflare, Sucuri, Incapsula real IP tracker.β1,768Jul 25, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β985Jan 12, 2024Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.β1,415Jan 19, 2025Updated last year
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.β39Aug 9, 2023Updated 2 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare networkβ2,519Mar 26, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory toolsβ2,158Updated this week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,280Updated this week
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flawsβ3,932Oct 4, 2025Updated 5 months ago
- Generates millions of keyword-based password mutations in seconds.β1,411Jun 8, 2025Updated 9 months ago
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without lβ¦β1,554Dec 21, 2025Updated 2 months ago
- The recursive internet scanner for hackers. π§‘β9,468Updated this week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Reβ¦β1,823Aug 20, 2025Updated 6 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secretsβ1,530Updated this week
- Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies foβ¦β1,272Sep 5, 2022Updated 3 years ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,β733Mar 21, 2024Updated last year
- Quickly discover exposed hosts on the internet using multiple search engines.β2,827Feb 25, 2026Updated last week
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs β¦β259Apr 3, 2025Updated 11 months ago
- Check your WAF before an attacker doesβ1,468Jul 17, 2025Updated 7 months ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.β1,156Mar 30, 2023Updated 2 years ago
- ππ¦ Dalfox is a powerful open-source XSS scanner and utility focused on automation.β4,859Feb 28, 2026Updated last week
- E4GL30S1NT - Simple Information Gathering Toolβ663Jun 8, 2025Updated 9 months ago
- A simple script just made for self use for bypassing 403β2,032May 30, 2024Updated last year
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a β¦β691Feb 23, 2026Updated 2 weeks ago
- π« Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fastβ¦β1,546Updated this week
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanningβ522Jul 5, 2023Updated 2 years ago
- bypass-url-parserβ1,115Updated this week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β4,347May 21, 2025Updated 9 months ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!β2,552Updated this week
- In-depth attack surface mapping and asset discoveryβ14,222Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Eβ¦β8,503Nov 16, 2025Updated 3 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,427Jan 19, 2025Updated last year
- A simple tool for bypassing file upload restrictions.β893Jul 22, 2024Updated last year
- Real-world infosec wordlists, updated regularlyβ1,642Mar 2, 2026Updated last week
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters andβ¦β802Jul 4, 2023Updated 2 years ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomainβ¦β888May 3, 2023Updated 2 years ago
- Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.β1,583Mar 4, 2024Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDRβ3,166Mar 28, 2025Updated 11 months ago