• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

behind

  1. itsMe

    Hakoriginfinder: discovering the origin host behind a reverse proxy

    Tool for discovering the origin host behind a reverse proxy. Useful for bypassing WAFs and other reverse proxies. How does it work? This tool will first make an HTTP request to the hostname that you provide and store the response, then it will make a request to every IP address that you...
  2. itsMe

    Phyton Email-Prediction-Asterisks - Script That Allows You To Identify The Emails Hidden Behind Asterisks

    Email prediction asterisks is a script that allows you to identify the emails hidden behind asterisks. It is a perfect application for osint analysts and security forces. It allows to intelligently predict, using Intelx leaks, which emails are related to the person we are looking for. It also...
  3. itsMe

    CloudFail v1.0.4 - find hidden IP’s behind the CloudFlare network

    CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases. Disclaimer This tool is a...
  4. itsMe

    CloudFail v1.0.3 - find hidden IP’s behind the CloudFlare network

    CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.     Misconfigured DNS scan...
  5. W

    [New] Finding the real IP behind Cloudflare

    Hidden content  
  6. itsMe

    CloudFail: find hidden IP’s behind the CloudFlare network

    CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.     Misconfigured DNS scan...
Back
Top