facebook facebook twitter rss

Cloud Flare bypasser (brute force subdomains)

Author: Terrorist_Dz , Published: 03-06-2015

#!/usr/bin/python

import time

import httplib

import sys

print'''
============================================
slamu Alaykum
Author : Terrorist_Dz
Tool : Cloud Flare Bypasser
Method : Brute Force Subdomains
Cause : #OP_kuffar
tutorial : https://youtu.be/SbJpeU9DH1Q
============================================
'''

site = raw_input("Y0ur targeted website : ")

cloudflare = {"multipe","smtp","documentation","ftp","cloud","site","format","code","ssl","cpanel","mail","webmail","tv","forum","help","record","direct","blog","employer","dns","wiki","show","video","download","downloader","kart","buy","business","multi","support","id","translate","free","en","ar","online","upload","web","info","fr","de","es","uk"}

print (' dealing with ' + site)

print

try:
for cf in cloudflare:
cf = "http://" + cf + '.' + site
terrorist = httplib.HTTPConnection(site)
terrorist.request('GET',cf)
terrorist = terrorist.getresponse()
print '%s %s %s' % (cf,terrorist.status,terrorist.reason)
if terrorist.status == 200:
raw_input("[^^]we found a subdomain, press enter to continue[^^] \n" )

except (KeyboardInterrupt, SystemExit):
print ("work is finished")

Like us on Facebook :