Repository History

Explore all analyzed open source repositories

Topic: Network Security
CloakQuest3r: Uncovering Real IPs Behind Cloudflare and Reverse Proxies

CloakQuest3r: Uncovering Real IPs Behind Cloudflare and Reverse Proxies

CloakQuest3r is an open-source Python tool designed for security professionals to uncover the real origin IP addresses of websites protected by Cloudflare and other reverse proxy services. It achieves this through comprehensive subdomain enumeration, DNS history analysis, and SSL certificate examination. This tool is invaluable for authorized security testing and strengthening web infrastructure defenses.

Jan 9, 2026
View Details
RustScan: The Modern, Fast, and Extensible Port Scanner

RustScan: The Modern, Fast, and Extensible Port Scanner

RustScan is a cutting-edge port scanner designed for speed and efficiency, capable of scanning all 65k ports in just 3 seconds. It features a powerful scripting engine supporting Python, Lua, and Shell, allowing for automated task execution and seamless integration with tools like Nmap. With adaptive learning capabilities and a focus on accessibility, RustScan offers a modern and highly customizable solution for network security professionals.

Nov 24, 2025
View Details
DarkFlare: Stealthy TCP-over-CDN Tunnel for Firewall Piercing

DarkFlare: Stealthy TCP-over-CDN Tunnel for Firewall Piercing

DarkFlare is a stealthy command-line tool designed to create TCP-over-CDN tunnels, effectively disguising TCP traffic as innocent HTTPS requests. This enables users to bypass restrictive firewalls and network censorship by leveraging widely accessible CDN infrastructure like Cloudflare. It operates with both client and server components, ensuring secure and scalable access to blocked content or internal resources.

Nov 15, 2025
View Details
Argus: The Ultimate Python Toolkit for Information Gathering and Reconnaissance

Argus: The Ultimate Python Toolkit for Information Gathering and Reconnaissance

Argus is a powerful, Python-based toolkit designed for comprehensive information gathering and reconnaissance. It features an intuitive command-line interface and over 130 modules for in-depth analysis of networks, web applications, and security configurations. This tool empowers users to efficiently explore target systems, providing valuable insights for educational and ethical security assessments.

Nov 4, 2025
View Details
Page 1