Skip to content

Latest commit

 

History

History
99 lines (74 loc) · 4.77 KB

README.md

File metadata and controls

99 lines (74 loc) · 4.77 KB


CrimeFlare is back again! This tools can help you to see the real IP behind CloudFlare protected websites





Donation for project development


Introduction

This tool serves to find the original IP behind websites that have been protected by CloudFlare, the information generated can be useful for further penetration. The information generated by this tool is as follows.

  • CloudFlare IP
  • CloudFlare NS1
  • CloudFlare NS2
  • Real IP
  • Hostname
  • Organization
  • Address (Country, City, Region, Postal Code)
  • Location
  • Time Zone

Code Samples

This tool is made with PHP code with very simple programming using several APIs to get maximum results, but this tool does not guarantee 100% to be able to bypass websites that have been protected by CloudFlare. Some websites sometimes cannot be detected by their original IP.

API Used In This Tool

Additional reference tool to see the real IP behind WAF Cloudflare

OsintSec - Information Gathering Intelligence

Simple tools for further penetration, this tool is able to visualize network from Domain, IP, Email and more.

Installation

Before running CrimeFlare make sure you have php-curl installed, install it with the command sudo apt install php-curl and follow the next installation steps.

git clone https://github.com/zidansec/CloudPeler.git
cd CloudPeler
./crimeflare.php exemple.com

Simple install CrimeFlare on Ubuntu:

sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare && sudo chmod +x /bin/crimeflare

Run command: crimeflare or crimeflare exemple.com

Easy to run

If you want to run crimeflare easily on linux ubuntu, follow the below command. This command will add the crimeflare.php file into the /bin/ directory on your Ubuntu OS.

cd CloudPeler
sudo cp crimeflare.php /bin/crimeflare

To run it now just type command crimeflare in your linux terminal

Reference: