EN
ENNA

CloudFlair vs Steampipe

GitHub Stats

2.9k
Stars
7.7k
380
Forks
332
11
Issues
27
11mo ago
Updated
4d ago
-
License
AGPL-3.0
Python
Language
Go

About CloudFlair

CloudFlair is a tool for finding origin servers of websites protected by Cloudflare, using Internet-wide scan data from Censys. When a website uses Cloudflare as a reverse proxy, the actual origin server's IP address is hidden. CloudFlair works by searching Censys for IPv4 hosts that present an SSL certificate associated with the target domain, then checks each candidate to see if it responds with the same content as the Cloudflare-protected site. This technique is effective because many administrators configure SSL certificates on their origin servers that match the domain they're protecting, but forget to restrict direct IP access. It's a valuable tool for penetration testers looking to bypass Cloudflare's WAF and DDoS protection.

About Steampipe

Steampipe is an open-source tool from Turbot that lets you query cloud infrastructure, SaaS services, and more using standard SQL. Rather than learning dozens of CLI tools and API formats, you write SQL queries against a unified schema powered by PostgreSQL. With over 140 plugins covering AWS, Azure, GCP, Kubernetes, GitHub, Slack, and many others, Steampipe provides a single pane of glass for infrastructure visibility. Its compliance frameworks (called Mods) include pre-built benchmarks for CIS, NIST, PCI DSS, and SOC 2, making it a powerful tool for both security auditing and operational troubleshooting. Steampipe also supports dashboards for visualization and can export results in JSON, CSV, or markdown.

Platform Support

🐧linux🍎macos🪟windows
🐧linux🍎macos🪟windows

Tags

CloudFlair only

cloudflareorigin-ipcensysbypasswaf-evasion

Steampipe only

sqlcloud-auditcompliancemulti-cloudzero-etlpostgres