Awesome Open Source
Awesome Open Source


CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by Cloudflare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.

  1. Misconfigured DNS scan using
  2. Scan the database.
  3. Bruteforce scan over 2500 subdomains.

Example usage

Please feel free to contribute to this project. If you have an idea or improvement issue a pull request!


This tool is a PoC (Proof of Concept) and does not guarantee results. It is possible to setup Cloudflare properly so that the IP is never released or logged anywhere; this is not often the case and hence why this tool exists. This tool is only for academic purposes and testing under controlled environments. Do not use without obtaining proper authorization from the network owner of the network under testing. The author bears no responsibility for any misuse of the tool.

Install on Kali/Debian

First we need to install pip3 for python3 dependencies:

$ sudo apt-get install python3-pip

Then we can run through dependency checks:

$ pip3 install -r requirements.txt

If this fails because of missing setuptools, do this:

sudo apt-get install python3-setuptools


To run a scan against a target:

python3 --target

To run a scan against a target using Tor:

service tor start

(or if you are using Windows or Mac install vidalia or just run the Tor browser)

python3 --target --tor

Please make sure you are running with Python3 and not Python2.*.



  • argparse
  • colorama
  • socket
  • binascii
  • datetime
  • requests
  • win_inet_pton
  • dnspython

Donate BTC


Buy me a beer or coffee... or both! If you donate send me a message and I will add you to the credits! Thank YOU!

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
python (53,699
python3 (1,615
database (1,225
pentesting (376
scanner (226
pentest (208
tor (120
cloudflare (109
recon (91
bruteforce (72
ip (67