base on CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server. <a href="https://visitcount.itsvg.in">
<img src="https://visitcount.itsvg.in/api?id=CrimeFlare&label=Visitors&color=6&icon=5&pretty=true" />
</a>
<!--<br /><div align="center"><h1><img width="70%" src="https://readme-typing-svg.herokuapp.com?font=Lalezar&duration=10000&pause=1000&color=F70000&width=635&lines=This+tool+is+no+longer+working+for+now%2C+the+project+will+be+resumed+later." /></h1><br />DONATION<br /><br /><a href="https://www.paypal.me/zidansec"><img title="Donations For Projects" height="25" src="https://ionicabizau.github.io/badges/paypal.svg" /></a></div><br />-->
<div align="center">
<h1><img width="80%" src="https://readme-typing-svg.herokuapp.com?duration=03&font=Lalezar&size=30&color=green¢er=true&vCenter=true&width=440&lines=CrimeFlare+Bypass+Hostname" /></h1>
<br />
<p>CrimeFlare is back again! This tools can help you to see the real IP behind CloudFlare protected websites</p>
<img src="https://i.imgur.com/1JKN2Oh.png" />
<br />
<a href="https://www.linux.org"><img src="https://img.shields.io/badge/OS-Linux-yellow?style=flat&logo=linux" /></a>
<a href="https://ubuntu.com/"><img src="https://img.shields.io/badge/Distro-Ubuntu-orange?style=flat&logo=ubuntu" /></a>
<a href="https://www.cloudflare.com/"><img src="https://img.shields.io/badge/Web%20Application%20Firewall-CloudFlare-orange?style=flat&logo=cloudflare" /></a>
<a href="https://github.com/zidansec"><img src="https://img.shields.io/badge/CrimeFlare-v2.2-red?style=flat&logo=red%20hat" /></a>
<br />
<a href="https://github.com/zidansec"><img src="https://img.shields.io/github/followers/zidansec?label=Github&style=social" /></a>
<a href="mailto:
[email protected]/"><img src="https://img.shields.io/badge/
[email protected]?style=social&logo=gmail" /></a>
<a href="https://youtube.com/channel/UCo6KfMw8dOZ4QGNL1RrjsBQ"><img src="https://img.shields.io/badge/YT-Exploitasi-dcdfe4?style=social&logo=youtube" /></a>
<br />
<br/>
<p width="20px"><b>Donation for project development</p></b>
<a href="https://www.buymeacoffee.com/zidansec"><img src="https://img.buymeacoffee.com/button-api/?text=Buy me a coffee&emoji=&slug=zidansec&button_colour=FF5F5F&font_colour=ffffff&font_family=Cookie&outline_colour=000000&coffee_colour=FFDD00" /></a><br />
<a href="https://www.paypal.me/zidansec"><img title="Donations For Projects" height="25" src="https://ionicabizau.github.io/badges/paypal.svg" /></a>
</div>
## Introduction
> This tool serves to find the original IP behind websites that have been protected by CloudFlare, the information generated can be useful for further penetration. The information generated by this tool is as follows.
- CloudFlare IP
- CloudFlare NS1
- CloudFlare NS2
- Real IP
- Hostname
- Organization
- Address (Country, City, Region, Postal Code)
- Location
- Time Zone
## Code Samples
> This tool is made with PHP code with very simple programming using several APIs to get maximum results, but this tool does not guarantee 100% to be able to bypass websites that have been protected by CloudFlare. Some websites sometimes cannot be detected by their original IP.
## API Used In This Tool
- https://crimeflare.zidansec.com
- http://ipinfo.io/2.2.2.2/json
Additional reference tool to see the real IP behind WAF Cloudflare
## OsintSec - Information Gathering Intelligence
> Simple tools for further penetration, this tool is able to visualize network from Domain, IP, Email and more.
- https://osinthreat.herokuapp.com/
<a href='https://osinthreat.herokuapp.com/domain.php?domain=fbi.gov' target='_blank'><img src='https://i.imgur.com/QDDBUCV.png' /></a>
## Installation
Before running CrimeFlare make sure you have `php-curl` installed, install it with the command `sudo apt install php-curl` and follow the next installation steps.
```bash
git clone https://github.com/zidansec/CloudPeler.git
```
```bash
cd CloudPeler
```
```bash
./crimeflare.php exemple.com
```
Simple install CrimeFlare on Ubuntu:
```bash
sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare && sudo chmod +x /bin/crimeflare
```
Run command: `crimeflare` or `crimeflare exemple.com`
### Easy to run
If you want to run crimeflare easily on linux ubuntu, follow the below command. This command will add the `crimeflare.php` file into the `/bin/` directory on your Ubuntu OS.
```bash
cd CloudPeler
```
```bash
sudo cp crimeflare.php /bin/crimeflare
```
To run it now just type command `crimeflare` in your linux terminal
<div align="center"><img width="1000px" src="https://i.imgur.com/WEC9PyZ.gif" /></div>
## Reference:
- [https://www.xploit.my.id/2021/07/crimeflare-bypass-tools-cloudflare.html](https://www.xploit.my.id/2021/07/crimeflare-bypass-tools-cloudflare.html)
- [https://zidansec.com/cloudpeler-crimeflare-next-generation/](https://zidansec.com/crimeflare-tools-is-back-again/)
", Assign "at most 3 tags" to the expected json: {"id":"4826","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"