Forwarded from Exploiting Crew (Pr1vAt3)
Breach Sites / Discovery Tools:
https://github.com/antonlindstrom/passpwn whatbreach h8mail hibp
https://github.com/hmaverickadams/breach-parse
https://github.com/KathanP19/BreachedDataScraper
https://github.com/ofarukcaki/dataleaks
https://github.com/xakepnz/BLUELAY https://github.com/jayyogesh/BaseQuery
https://github.com/artofscripting/PySearchBreachCompilation
https://github.com/chparmley/FB-Breach-Checker
https://github.com/FreiBj/data-breach-formatter
https://github.com/p4wnsolo/EmailPwnCheckerbot ( this is also a great Selenium example )
https://github.com/GihuMendes/breach-parse/blob/main/parser.sh ( parse COMB with simple Python )
https://github.com/SagarSRJ/Breach-Parser ( parse .csv )
https://github.com/davieking1/breachpearser ( parse COMB )
https://github.com/TheFern2/breach-parse.py/tree/main/breach_parse ( parse COMB - looks recent )
https://github.com/FreeZeroDays/breach-rip ( faster COMB parser )
https://github.com/alivirgo/read-a-password-file-huge-lists
https://github.com/martintjj/BreachCompilation ( tools in Breach Compilation - 4 yrs old )
https://github.com/jesusgoku/targz-search ( search .txt files within .tar.gz files )
https://github.com/antonlindstrom/passpwn whatbreach h8mail hibp
https://github.com/hmaverickadams/breach-parse
https://github.com/KathanP19/BreachedDataScraper
https://github.com/ofarukcaki/dataleaks
https://github.com/xakepnz/BLUELAY https://github.com/jayyogesh/BaseQuery
https://github.com/artofscripting/PySearchBreachCompilation
https://github.com/chparmley/FB-Breach-Checker
https://github.com/FreiBj/data-breach-formatter
https://github.com/p4wnsolo/EmailPwnCheckerbot ( this is also a great Selenium example )
https://github.com/GihuMendes/breach-parse/blob/main/parser.sh ( parse COMB with simple Python )
https://github.com/SagarSRJ/Breach-Parser ( parse .csv )
https://github.com/davieking1/breachpearser ( parse COMB )
https://github.com/TheFern2/breach-parse.py/tree/main/breach_parse ( parse COMB - looks recent )
https://github.com/FreeZeroDays/breach-rip ( faster COMB parser )
https://github.com/alivirgo/read-a-password-file-huge-lists
https://github.com/martintjj/BreachCompilation ( tools in Breach Compilation - 4 yrs old )
https://github.com/jesusgoku/targz-search ( search .txt files within .tar.gz files )
GitHub
GitHub - antonlindstrom/passpwn: See if your passwords in pass has been breached.
See if your passwords in pass has been breached. Contribute to antonlindstrom/passpwn development by creating an account on GitHub.
π¦ChatGPT Jailbreaking prompts, exploits and other fun stuff:
https://gist.github.com/jahtzee/5d02b310b1d39b047664bec20a9be17c
https://gist.github.com/jahtzee/5d02b310b1d39b047664bec20a9be17c
Gist
ChatGPT Jailbreaking prompts, exploits and other fun stuff
ChatGPT Jailbreaking prompts, exploits and other fun stuff - prompts.txt
Forwarded from Exploiting Crew (Pr1vAt3)
π¦Top password lists generated from leaks collected from different paste sites:
https://github.com/rndinfosecguy/pastePasswordLists
https://github.com/rndinfosecguy/pastePasswordLists
GitHub
GitHub - rndinfosecguy/pastePasswordLists: Top password lists generated from leaks collected from different paste sites
Top password lists generated from leaks collected from different paste sites - rndinfosecguy/pastePasswordLists
π Common Networking Port Numbers:
1οΈβ£ Port 22 (SSH): Used for Secure Shell (SSH) connections, enabling secure access to remote servers.
2οΈβ£ Port 80 (HTTP): The standard port for unencrypted web traffic; used by HTTP protocols for web browsing.
3οΈβ£ Port 443 (HTTPS): Secure HTTP port, vital for encrypted web traffic, ensuring safe data transfer online.
4οΈβ£ Port 53 (DNS): Domain Name System port, used for translating domain names to IP addresses.
5οΈβ£ Port 25 (SMTP): Simple Mail Transfer Protocol, responsible for email transmission.
6οΈβ£ Port 1433 (SQL Server): Microsoft SQL Server communication port, essential for database interactions.
7οΈβ£ Port 3389 (RDP): Remote Desktop Protocol port, used for remote access to Windows servers.
8οΈβ£ Port 3306 (MySQL): Default port for MySQL database connections.
9οΈβ£ Port 123 (NTP): Network Time Protocol, used to synchronize time across systems.
Source: Linkedin
1οΈβ£ Port 22 (SSH): Used for Secure Shell (SSH) connections, enabling secure access to remote servers.
2οΈβ£ Port 80 (HTTP): The standard port for unencrypted web traffic; used by HTTP protocols for web browsing.
3οΈβ£ Port 443 (HTTPS): Secure HTTP port, vital for encrypted web traffic, ensuring safe data transfer online.
4οΈβ£ Port 53 (DNS): Domain Name System port, used for translating domain names to IP addresses.
5οΈβ£ Port 25 (SMTP): Simple Mail Transfer Protocol, responsible for email transmission.
6οΈβ£ Port 1433 (SQL Server): Microsoft SQL Server communication port, essential for database interactions.
7οΈβ£ Port 3389 (RDP): Remote Desktop Protocol port, used for remote access to Windows servers.
8οΈβ£ Port 3306 (MySQL): Default port for MySQL database connections.
9οΈβ£ Port 123 (NTP): Network Time Protocol, used to synchronize time across systems.
Source: Linkedin
Forwarded from Exploiting Crew (Pr1vAt3)
π¦Use or automate Telegram like a pro
Telegram Messenger CLI:
A command-line interface (CLI) for Telegram that allows interacting with the Telegram messaging platform directly from the terminal. It provides features like messaging, contact management, and integration with the Telegram API, making it a powerful tool for developers and automation enthusiasts.
---
### Key Features:
1. API Integration: Full access to Telegram's API and MTProto protocol.
2. Command-Line Interaction:
- Messaging.
- Managing contacts and chats.
- Forwarding and deleting messages.
3. Customization:
- Supports TAB completion and command history.
- Configurable paths for server keys and data files.
4. Cross-Platform Compatibility:
- Available for Linux, BSDs, macOS, and other Unix-like systems.
5. Extensibility:
- Python integration for scripting and automation.
---
### Installation:
#### Clone Repository:
#### Dependencies:
Install the required libraries:
- Ubuntu/Debian:
- Fedora:
- Arch Linux:
- macOS (Homebrew):
#### Build and Configure:
---
### Usage:
#### Basic Run:
#### Commands:
- Messaging:
- Contacts:
- Chats:
- Message Management:
#### Special Notes:
- Use TAB to auto-complete peer names and commands.
- Peer names:
- Users: Replace spaces with underscores (e.g.,
- Chats: Use the chat title, replacing spaces with underscores.
- Encrypted chats: Prefix with
---
### Upgrading:
When upgrading to version 1.0:
1. Binary moved to
2. Config directory updated to
3. Requires re-login due to database incompatibility.
4. Peer names now use
---
### GitHub Repository:
Find the full documentation, source code, and issue tracker here:
[Telegram CLI Repository](https://github.com/vysheng/tg)
---
This tool is ideal for automation, server-side Telegram management, and for developers looking to integrate Telegram functionality into their workflows. Let me know if you'd like further help with scripting or configuring Telegram CLI!
Telegram Messenger CLI:
A command-line interface (CLI) for Telegram that allows interacting with the Telegram messaging platform directly from the terminal. It provides features like messaging, contact management, and integration with the Telegram API, making it a powerful tool for developers and automation enthusiasts.
---
### Key Features:
1. API Integration: Full access to Telegram's API and MTProto protocol.
2. Command-Line Interaction:
- Messaging.
- Managing contacts and chats.
- Forwarding and deleting messages.
3. Customization:
- Supports TAB completion and command history.
- Configurable paths for server keys and data files.
4. Cross-Platform Compatibility:
- Available for Linux, BSDs, macOS, and other Unix-like systems.
5. Extensibility:
- Python integration for scripting and automation.
---
### Installation:
#### Clone Repository:
git clone --recursive https://github.com/vysheng/tg.git && cd tg
#### Dependencies:
Install the required libraries:
- Ubuntu/Debian:
sudo apt-get install libreadline-dev libconfig-dev libssl-dev lua5.2 liblua5.2-dev libevent-dev libjansson-dev libpython-dev make
- Fedora:
sudo dnf install lua-devel openssl-devel libconfig-devel readline-devel libevent-devel libjansson-devel python-devel
- Arch Linux:
yaourt -S telegram-cli-git
- macOS (Homebrew):
brew install libconfig readline lua python libevent jansson
export CFLAGS="-I/usr/local/include -I/usr/local/Cellar/readline/6.3.8/include"
export LDFLAGS="-L/usr/local/lib -L/usr/local/Cellar/readline/6.3.8/lib"
#### Build and Configure:
./configure
make
---
### Usage:
#### Basic Run:
bin/telegram-cli -k tg-server.pub
#### Commands:
- Messaging:
msg <peer> <Text>
fwd <user> <msg-seqno>
mark_read <peer>
- Contacts:
add_contact <phone-number> <first-name> <last-name>
rename_contact <user> <first-name> <last-name>
- Chats:
chat_with_peer <peer>
- Message Management:
delete_msg <msg-seqno>
restore_msg <msg-seqno>
#### Special Notes:
- Use TAB to auto-complete peer names and commands.
- Peer names:
- Users: Replace spaces with underscores (e.g.,
John_Doe).- Chats: Use the chat title, replacing spaces with underscores.
- Encrypted chats: Prefix with
! (e.g., !John_Doe).---
### Upgrading:
When upgrading to version 1.0:
1. Binary moved to
./bin and renamed to telegram-cli.2. Config directory updated to
${HOME}/.telegram-cli.3. Requires re-login due to database incompatibility.
4. Peer names now use
@ instead of #.---
### GitHub Repository:
Find the full documentation, source code, and issue tracker here:
[Telegram CLI Repository](https://github.com/vysheng/tg)
---
This tool is ideal for automation, server-side Telegram management, and for developers looking to integrate Telegram functionality into their workflows. Let me know if you'd like further help with scripting or configuring Telegram CLI!
GitHub
GitHub - vysheng/tg: telegram-cli
telegram-cli. Contribute to vysheng/tg development by creating an account on GitHub.
π¦ leaking and bypassing Android malware detection system:
> old but gold
https://youtu.be/GkMyobbyl88
> old but gold
https://youtu.be/GkMyobbyl88
YouTube
AVPASS infers and bypasses AVs
π¦ ExplorerPatcher Installation and Configuration Guide
ExplorerPatcher enhances the Windows desktop experience, bringing back classic features like the Windows 10 taskbar, Start menu, and Alt+Tab interface on Windows 11.
### How to Install ExplorerPatcher
1. Download the Installer:
- Visit the official source to download the latest version of the setup program.
- Choose the appropriate version:
-
-
2. Run the Installer:
- Double-click the setup file.
- Accept the User Account Control (UAC) prompt for elevation.
- The installer will automatically add the required files.
3. Access ExplorerPatcher Settings:
- Once installation is complete, right-click the taskbar and select "Properties" to open the configuration interface.
### Customizing ExplorerPatcher
1. Windows 10 Taskbar on Windows 11:
- Go to the "Taskbar" section.
- Change the Taskbar style to Windows 10 (ExplorerPatcher).
2. Windows 10 Start Menu:
- Navigate to the "Start menu" section.
- Change the Start menu style to Windows 10.
3. Windows 10 Alt+Tab Interface:
- Open the "Window switcher" section.
- Set the Window switcher (Alt+Tab) style to Windows 10.
4. Explore Additional Features:
- Browse through other sections to tweak additional settings, such as system tray behavior, network icons, or window snapping.
### Important Notes
- Make sure your antivirus is configured to allow ExplorerPatcher to avoid interruptions.
- Regularly check for updates to stay compatible with the latest Windows 11 versions.
Download:
https://github.com/valinet/ExplorerPatcher
ExplorerPatcher enhances the Windows desktop experience, bringing back classic features like the Windows 10 taskbar, Start menu, and Alt+Tab interface on Windows 11.
### How to Install ExplorerPatcher
1. Download the Installer:
- Visit the official source to download the latest version of the setup program.
- Choose the appropriate version:
-
ep_setup.exe for Intel or AMD processors.-
ep_setup_arm64.exe for Snapdragon processors.2. Run the Installer:
- Double-click the setup file.
- Accept the User Account Control (UAC) prompt for elevation.
- The installer will automatically add the required files.
3. Access ExplorerPatcher Settings:
- Once installation is complete, right-click the taskbar and select "Properties" to open the configuration interface.
### Customizing ExplorerPatcher
1. Windows 10 Taskbar on Windows 11:
- Go to the "Taskbar" section.
- Change the Taskbar style to Windows 10 (ExplorerPatcher).
2. Windows 10 Start Menu:
- Navigate to the "Start menu" section.
- Change the Start menu style to Windows 10.
3. Windows 10 Alt+Tab Interface:
- Open the "Window switcher" section.
- Set the Window switcher (Alt+Tab) style to Windows 10.
4. Explore Additional Features:
- Browse through other sections to tweak additional settings, such as system tray behavior, network icons, or window snapping.
### Important Notes
- Make sure your antivirus is configured to allow ExplorerPatcher to avoid interruptions.
- Regularly check for updates to stay compatible with the latest Windows 11 versions.
Download:
https://github.com/valinet/ExplorerPatcher
GitHub
GitHub - valinet/ExplorerPatcher: This project aims to enhance the working environment on Windows
This project aims to enhance the working environment on Windows - valinet/ExplorerPatcher
π¦Modular penetration testing platform that enables you to write, test, and execute exploit code.
HatSploit Framework:
Installing Python
Most Unix-like systems (e.g., Ubuntu or Debian) already include Python. If not, or if you need the latest version, follow these steps:
1. Update your package list:
2. Install Python 3 and pip:
- This ensures both Python 3 and
3. Verify the installation:
- These commands should output the installed versions of Python and pip.
---
### Installing HatSploit
1. Install HatSploit Framework via pip:
2. Verify the installation:
- To confirm that HatSploit is installed correctly, try running the framework:
- If the command launches the framework, the installation was successful.
---
### Additional Notes
- Make sure you have git installed on your system to allow
- If you encounter permission issues during the
Let me know if you need further assistance!
HatSploit Framework:
Installing Python
Most Unix-like systems (e.g., Ubuntu or Debian) already include Python. If not, or if you need the latest version, follow these steps:
1. Update your package list:
sudo apt-get update
2. Install Python 3 and pip:
sudo apt-get install -y python3 python3-pip
- This ensures both Python 3 and
pip, the Python package manager, are installed.3. Verify the installation:
python3 --version
pip3 --version
- These commands should output the installed versions of Python and pip.
---
### Installing HatSploit
1. Install HatSploit Framework via pip:
pip3 install git+https://github.com/EntySec/HatSploit
2. Verify the installation:
- To confirm that HatSploit is installed correctly, try running the framework:
hatsploit
- If the command launches the framework, the installation was successful.
---
### Additional Notes
- Make sure you have git installed on your system to allow
pip3 to clone the GitHub repository. If not, install it using:sudo apt-get install -y git
- If you encounter permission issues during the
pip3 install step, try adding --user to the command or use sudo.Let me know if you need further assistance!
GitHub
GitHub - EntySec/HatSploit: Modular penetration testing platform that enables you to write, test, and execute exploit code.
Modular penetration testing platform that enables you to write, test, and execute exploit code. - EntySec/HatSploit
π¦AI security related frameworks, attacks, tools and papers:
https://github.com/ottosulin/awesome-ai-security
https://github.com/ottosulin/awesome-ai-security
GitHub
GitHub - ottosulin/awesome-ai-security: A collection of awesome resources related AI security
A collection of awesome resources related AI security - ottosulin/awesome-ai-security
Forwarded from Exploiting Crew (Pr1vAt3)
30 Best Courses For Network Engineer on Youtube:
============================
1. Network Troubleshooting
https://lnkd.in/dkqAVF7U
2. Palo Alto Firewall
https://lnkd.in/dj4NtUMj
3. Cisco SD-WAN
https://lnkd.in/dp6uEDtN
4. Scenario-Based Network Configuration
https://lnkd.in/dA7aTHHA
5. Real-Time Networks Trouble Ticket
https://lnkd.in/dDGYPVs2
6. Viptela SD-WAN Configurations
https://lnkd.in/dXDwhB8u
7. Enterprise Network Configuration
https://lnkd.in/dQhGW4Ae
8. Small Companies Network
https://lnkd.in/d9ffBAKM
9. Switching Technology
https://lnkd.in/dPUCnr86
10. Real Devices Configuration
https://lnkd.in/dMj-HkCA
11. Live Training
https://lnkd.in/dZeX7UdX
12. EIGRP
https://lnkd.in/dMVp98a4
13. Wireless
https://lnkd.in/djjQZPJA
14. ASA Firewall Configuration
https://lnkd.in/djiSD5xE
15. Voice over IP(VoIP)
https://lnkd.in/dsHv2R6V
16. Important Networking Topics
https://lnkd.in/dTsd-h_k
17. OSPF
https://lnkd.in/dUYZME73
18. CCNA 200-301
https://lnkd.in/d8WtGDk6
19. VPN
https://lnkd.in/d7shGyZ6
20. STP
https://lnkd.in/dfVQqetM
21. Basic Configurations
https://lnkd.in/dSybFbZr
22. BGP
https://lnkd.in/dRNCvUgn
23. MPLS
https://lnkd.in/d7ekXYm8
24. IPv6
https://lnkd.in/dGNKcyKT
25. VRF
https://lnkd.in/dxSXx2sK
26. PBR
https://lnkd.in/du4k2BUX
27. EtherChannel
https://lnkd.in/dhxYtpwY
28. FHRP Full Course
https://lnkd.in/d3rzcCfc
29. Subnetting QnA
https://lnkd.in/dZyJjkc5
30. Packet Flow
https://lnkd.in/ddtQ2YJz
============================
1. Network Troubleshooting
https://lnkd.in/dkqAVF7U
2. Palo Alto Firewall
https://lnkd.in/dj4NtUMj
3. Cisco SD-WAN
https://lnkd.in/dp6uEDtN
4. Scenario-Based Network Configuration
https://lnkd.in/dA7aTHHA
5. Real-Time Networks Trouble Ticket
https://lnkd.in/dDGYPVs2
6. Viptela SD-WAN Configurations
https://lnkd.in/dXDwhB8u
7. Enterprise Network Configuration
https://lnkd.in/dQhGW4Ae
8. Small Companies Network
https://lnkd.in/d9ffBAKM
9. Switching Technology
https://lnkd.in/dPUCnr86
10. Real Devices Configuration
https://lnkd.in/dMj-HkCA
11. Live Training
https://lnkd.in/dZeX7UdX
12. EIGRP
https://lnkd.in/dMVp98a4
13. Wireless
https://lnkd.in/djjQZPJA
14. ASA Firewall Configuration
https://lnkd.in/djiSD5xE
15. Voice over IP(VoIP)
https://lnkd.in/dsHv2R6V
16. Important Networking Topics
https://lnkd.in/dTsd-h_k
17. OSPF
https://lnkd.in/dUYZME73
18. CCNA 200-301
https://lnkd.in/d8WtGDk6
19. VPN
https://lnkd.in/d7shGyZ6
20. STP
https://lnkd.in/dfVQqetM
21. Basic Configurations
https://lnkd.in/dSybFbZr
22. BGP
https://lnkd.in/dRNCvUgn
23. MPLS
https://lnkd.in/d7ekXYm8
24. IPv6
https://lnkd.in/dGNKcyKT
25. VRF
https://lnkd.in/dxSXx2sK
26. PBR
https://lnkd.in/du4k2BUX
27. EtherChannel
https://lnkd.in/dhxYtpwY
28. FHRP Full Course
https://lnkd.in/d3rzcCfc
29. Subnetting QnA
https://lnkd.in/dZyJjkc5
30. Packet Flow
https://lnkd.in/ddtQ2YJz
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
πππ ππ πππππππ ππππππππ π
ππ πππππππππππππ ππππ
πππππππππ
βΉοΈ Hereβs a comprehensive list of top VMs tailored for various cybersecurity domains, from Pentesting and Red Teaming to Digital Forensics and Privacy:
πΏ Predator-OS (Pentesting):
https://predator-os.ir/
πΏ BlackArch Linux (Pentesting):
https://lnkd.in/dQuQV4SK
πΏ BackBox (Pentesting):
https://www.backbox.org/
πΏ Kookarai (Pentesting):
https://lnkd.in/d-4ckJ97
πΏ Parrot Security OS (Red and Blue Team operation):
https://parrotsec.org/
πΏ Commando VM (Windows-based Pentesting/Red Teaming):
https://lnkd.in/dec8_V3B
πΏ Whonix (Privacy and Anonymity):
https://lnkd.in/dpWagU2f
πΏ Tails (Privacy and Anonymity):
https://tails.net/
πΏ Qubes OS (Hypervisor):
https://www.qubes-os.org/
πΏ Mandiant Threat Pursuit (Windows-based Threat Intelligence and Hunting):
https://lnkd.in/d-N4Dt9x
πΏ Tsurugi Linux (Digital Forensics and OSINT):
https://lnkd.in/dsr-ekeB
πΏ SIFT Workstation (Digital Forensics):
https://lnkd.in/dmnZRNNP
πΏ CSI Linux (Digital Forensics):
https://csilinux.com/
πΏ CAINE (Digital Forensics):
https://lnkd.in/dYn9b7Hs
πΏ RedHunt Labs-OS Linux (Adversary Emulation and Threat Hunting):
https://lnkd.in/db5sd6h3
πΏ FLARE-VM (Reverse Engineering):
https://lnkd.in/ds9s4Wdz
πΏ REMnux (Reverse Engineering/Malware Analysis):
https://remnux.org/
πΏ Trace Labs OSINT VM (OSINT to Find Missing Persons):
https://lnkd.in/dsymX2KG
πΏ Security Onion Solutions, LLC (Threat Hunting, Network Security Monitoring, and Log Management):
https://lnkd.in/d4r6myav
βΉοΈ Hereβs a comprehensive list of top VMs tailored for various cybersecurity domains, from Pentesting and Red Teaming to Digital Forensics and Privacy:
πΏ Predator-OS (Pentesting):
https://predator-os.ir/
πΏ BlackArch Linux (Pentesting):
https://lnkd.in/dQuQV4SK
πΏ BackBox (Pentesting):
https://www.backbox.org/
πΏ Kookarai (Pentesting):
https://lnkd.in/d-4ckJ97
πΏ Parrot Security OS (Red and Blue Team operation):
https://parrotsec.org/
πΏ Commando VM (Windows-based Pentesting/Red Teaming):
https://lnkd.in/dec8_V3B
πΏ Whonix (Privacy and Anonymity):
https://lnkd.in/dpWagU2f
πΏ Tails (Privacy and Anonymity):
https://tails.net/
πΏ Qubes OS (Hypervisor):
https://www.qubes-os.org/
πΏ Mandiant Threat Pursuit (Windows-based Threat Intelligence and Hunting):
https://lnkd.in/d-N4Dt9x
πΏ Tsurugi Linux (Digital Forensics and OSINT):
https://lnkd.in/dsr-ekeB
πΏ SIFT Workstation (Digital Forensics):
https://lnkd.in/dmnZRNNP
πΏ CSI Linux (Digital Forensics):
https://csilinux.com/
πΏ CAINE (Digital Forensics):
https://lnkd.in/dYn9b7Hs
πΏ RedHunt Labs-OS Linux (Adversary Emulation and Threat Hunting):
https://lnkd.in/db5sd6h3
πΏ FLARE-VM (Reverse Engineering):
https://lnkd.in/ds9s4Wdz
πΏ REMnux (Reverse Engineering/Malware Analysis):
https://remnux.org/
πΏ Trace Labs OSINT VM (OSINT to Find Missing Persons):
https://lnkd.in/dsymX2KG
πΏ Security Onion Solutions, LLC (Threat Hunting, Network Security Monitoring, and Log Management):
https://lnkd.in/d4r6myav
Penetration testing and Ethical hacking
mainpage
What is Predator-OS   v3.5 01-01-2025 Polymorphic Security Platform Predator-OS is an advanced Linux distribution developed in 2021 by Hossein Seilani, the creator of other well-known [β¦]
Forwarded from Exploiting Crew (Pr1vAt3)
π¦Cloudflare Bypass:
CrimeFlare - Bypass Cloudflare WAF and Reveal Real IPs
CrimeFlare is a PHP-based tool designed to identify the original IP address of websites protected by Cloudflare's Web Application Firewall (WAF). This information can be valuable for penetration testing and deeper analysis of websites that rely on Cloudflare for anonymity and security.
---
Features:
1. Cloudflare Information:
- Cloudflare-protected IPs.
- Cloudflare NS1 and NS2 details.
2. Real IP Revelation:
- Unmasks the original IP behind Cloudflare protection.
3. Additional Metadata:
- Hostname.
- Organization.
- Location details (Country, City, Region, Postal Code, Time Zone).
---
Disclaimer:
The tool is for educational and lawful penetration testing purposes only. Misuse of CrimeFlare for unauthorized access or malicious activities is illegal and unethical.
---
Installation:
#### Prerequisites:
1. PHP and
Install on Ubuntu:
#### Clone the Repository:
#### Run the Script:
To reveal the real IP behind a domain:
#### Easy Installation:
For quick execution from anywhere on Linux:
Now you can run CrimeFlare with:
---
### API Sources:
1. CrimeFlare API: [https://crimeflare.zidansec.com](https://crimeflare.zidansec.com)
2. IPInfo API: [http://ipinfo.io](http://ipinfo.io/2.2.2.2/json)
---
### Code Example:
CrimeFlare uses simple PHP scripting with APIs to gather and process data. The script sends HTTP requests to API endpoints and processes JSON responses to display the original IP and related metadata.
---
### Additional OSINT Tool:
OsintSec:
A tool for visualizing networks from domains, IPs, and emails.
[OsintSec Tool](https://osinthreat.herokuapp.com/)
---
### Quick Commands:
- Clone repository:
- Execute the script:
- Install for system-wide access:
- Run directly:
---
### GitHub Repository:
Access the archived repository for full documentation and source code:
[CrimeFlare GitHub Repository](https://github.com/zidansec/CloudPeler)
CrimeFlare - Bypass Cloudflare WAF and Reveal Real IPs
CrimeFlare is a PHP-based tool designed to identify the original IP address of websites protected by Cloudflare's Web Application Firewall (WAF). This information can be valuable for penetration testing and deeper analysis of websites that rely on Cloudflare for anonymity and security.
---
Features:
1. Cloudflare Information:
- Cloudflare-protected IPs.
- Cloudflare NS1 and NS2 details.
2. Real IP Revelation:
- Unmasks the original IP behind Cloudflare protection.
3. Additional Metadata:
- Hostname.
- Organization.
- Location details (Country, City, Region, Postal Code, Time Zone).
---
Disclaimer:
The tool is for educational and lawful penetration testing purposes only. Misuse of CrimeFlare for unauthorized access or malicious activities is illegal and unethical.
---
Installation:
#### Prerequisites:
1. PHP and
php-curl must be installed. Install on Ubuntu:
sudo apt install php php-curl
#### Clone the Repository:
git clone https://github.com/zidansec/CloudPeler.git
cd CloudPeler
#### Run the Script:
To reveal the real IP behind a domain:
php crimeflare.php example.com
#### Easy Installation:
For quick execution from anywhere on Linux:
sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare
sudo chmod +x /bin/crimeflare
Now you can run CrimeFlare with:
crimeflare example.com
---
### API Sources:
1. CrimeFlare API: [https://crimeflare.zidansec.com](https://crimeflare.zidansec.com)
2. IPInfo API: [http://ipinfo.io](http://ipinfo.io/2.2.2.2/json)
---
### Code Example:
CrimeFlare uses simple PHP scripting with APIs to gather and process data. The script sends HTTP requests to API endpoints and processes JSON responses to display the original IP and related metadata.
---
### Additional OSINT Tool:
OsintSec:
A tool for visualizing networks from domains, IPs, and emails.
[OsintSec Tool](https://osinthreat.herokuapp.com/)
---
### Quick Commands:
- Clone repository:
git clone https://github.com/zidansec/CloudPeler.git
- Execute the script:
php crimeflare.php example.com
- Install for system-wide access:
sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare
sudo chmod +x /bin/crimeflare
- Run directly:
crimeflare example.com
---
### GitHub Repository:
Access the archived repository for full documentation and source code:
[CrimeFlare GitHub Repository](https://github.com/zidansec/CloudPeler)
GitHub
GitHub - zidansec/CloudPeler: CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool youβ¦
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting infor...