{"id":13454582,"url":"https://github.com/m0rtem/CloudFail","last_synced_at":"2025-03-24T06:30:54.062Z","repository":{"id":38712568,"uuid":"59782406","full_name":"m0rtem/CloudFail","owner":"m0rtem","description":"Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network","archived":false,"fork":false,"pushed_at":"2024-03-26T19:44:29.000Z","size":40825,"stargazers_count":2316,"open_issues_count":57,"forks_count":484,"subscribers_count":63,"default_branch":"master","last_synced_at":"2025-03-23T20:38:26.503Z","etag":null,"topics":["bruteforce","cloudflare","cloudflare-ip","database","ip","pentest","pentesting","python3","recon","scanner","tor"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/m0rtem.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE.md","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2016-05-26T20:49:20.000Z","updated_at":"2025-03-21T19:38:32.000Z","dependencies_parsed_at":"2023-12-11T17:44:35.312Z","dependency_job_id":"4ebc73f5-b565-423a-9100-a8fe6721a633","html_url":"https://github.com/m0rtem/CloudFail","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/m0rtem%2FCloudFail","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/m0rtem%2FCloudFail/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/m0rtem%2FCloudFail/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/m0rtem%2FCloudFail/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/m0rtem","download_url":"https://codeload.github.com/m0rtem/CloudFail/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245222296,"owners_count":20580126,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bruteforce","cloudflare","cloudflare-ip","database","ip","pentest","pentesting","python3","recon","scanner","tor"],"created_at":"2024-07-31T08:00:55.583Z","updated_at":"2025-03-24T06:30:54.037Z","avatar_url":"https://github.com/m0rtem.png","language":"Python","readme":"# CloudFail\n\nCloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by Cloudflare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.\n\n1. Misconfigured DNS scan using DNSDumpster.com.\n2. Scan the Crimeflare.com database.\n3. Bruteforce scan over 2500 subdomains.\n\n![Example usage](http://puu.sh/pq7vH/62d56aa41f.png \"Example usage\")\n\n\u003e Please feel free to contribute to this project. If you have an idea or improvement issue a pull request!\n\n#### Disclaimer\nThis tool is a PoC (Proof of Concept) and does not guarantee results.  It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists.\nThis tool is only for academic purposes and testing  under controlled environments. Do not use without obtaining proper authorization\nfrom the network owner of the network under testing.\nThe author bears no responsibility for any misuse of the tool.\n\n#### Install on Kali/Debian\n\nFirst we need to install pip3 for python3 dependencies:\n\n```$ sudo apt-get install python3-pip```\n\nThen we can run through dependency checks:\n\n```$ pip3 install -r requirements.txt```\n\nIf this fails because of missing setuptools, do this:\n\n```sudo apt-get install python3-setuptools```\n\n#### Usage\n\nTo run a scan against a target:\n\n```python3 cloudfail.py --target seo.com```\n\nTo run a scan against a target using Tor:\n\n```service tor start```\n\n(or if you are using Windows or Mac install vidalia or just run the Tor browser)\n\n```python3 cloudfail.py --target seo.com --tor```\n\n\u003e Please make sure you are running with Python3 and not Python2.*.\n\n\n#### Dependencies\n**Python3**\n* argparse\n* colorama\n* socket\n* binascii\n* datetime\n* requests\n* win_inet_pton\n* dnspython\n\n## Donate BTC\n\u003e 13eiCHxmAEaRZDXcgKJVtVnCKK5mTR1u1F\n\nBuy me a beer or coffee... or both! \nIf you donate send me a message and I will add you to the credits!\nThank YOU!\n","funding_links":[],"categories":["红队\u0026渗透测试","Python","Other Awesome Lists","Network Tools","Python (1887)","Tools","CloudFlare","Network","Mobile","Tools by Category"],"sub_categories":["Non-CloudSec Stuff (TODO: move this elsewhere)","Network Reconnaissance Tools","Network Tools","XSS","Cloud","🌐 Website Monitoring \u0026 Analysis"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fm0rtem%2FCloudFail","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fm0rtem%2FCloudFail","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fm0rtem%2FCloudFail/lists"}