Offensive Security Tool: CF GeoBypasser Cyberpunk Framework

Reading Time: 2 Minutes
CF GeoBypasser Cyberpunk Framework
CF GeoBypasser Cyberpunk Framework, developed by Chris “SaintDruG” Abou-Chabke from Black Hat Ethical Hacking, is a Modular Offensive Toolkit designed to discover and bypass Cloudflare-based geo-restrictions using country-originating proxies.
See Also: So you want to be a hacker?
Offensive Security and Ethical Hacking Course
Who is It For?
- Red Teams
- Pentesters
- Advanced Offensive Operators
- Bug Bounty Hunters
- Security Engineers
This framework helps you bypass Cloudflare Geo-Restrictions for reconnaissance, mapping, enumeration, or pipeline scanning using valid country-based proxies.
Cyberpunk Inspiration
This project is inspired by Cyberpunk 2077’s Netrunners — Elite Digital infiltrators in a dystopian world who jack into networks, route through synthetic paths, and break through digital borders. The tool reflects that spirit:
- Proxies = false identities
- Netblocks = dark alleyways in cyberspace
- Target domains = encrypted megacorp nodes
See Also: Offensive Security Tool: HExHTTP
Description
CF GeoBypasser Cyberpunk Framework automates end-to-end bypass of Cloudflare country restrictions:
- Harvest netblocks of a target country
- Scan for proxies with masscan
- Validate working ones by testing access to a real target
- Route tools through those proxies to bypass CF blocks
It supports nuclei, feroxbuster, or any custom tool you integrate in module 4.
The Flow Behind It
Each step is modular. Results are saved cleanly inside data/ folders.
1. Netblock Harvesting
- You input a 2-letter country code (e.g., DE, FR, CY)
- The tool fetches IPv4 netblocks from:
ipinfo.io
bgpview.io
RIPEstat - Output: data/CY_target_country_ranges.txt
2. Masscan Proxy Harvesting
- Scans all IPs in target ranges for proxy ports: 80, 8080, 3128, 1080
- Uses masscan for ultra-fast Internet-scale scanning
- Why masscan?
Uses its own TCP/IP stack
Capable of scanning the entire internet in 15 minutes
Way faster than nmap for discovery - Output: data/scan_output_CY.txt
3. Proxy Validation
- Validates each proxy by checking if it can reach your actual target domain
- Only working proxies are saved
- Output: data/working_proxies_CY.txt
4. Geo-Bypass Scanning
User chooses:
- [1] Nuclei – vulnerability scanner with customizable templates
- [2] Feroxbuster – directory brute-forcer
Options:
- Scan through proxies (bypass mode)
- Scan directly (no proxy)
Output is saved per-proxy under a domain-named folder:
data/scan_results//.txt
You can also:
- Replace nuclei or feroxbuster with any other CLI tool (e.g. ffuf, nikto, gobuster)
- Use modules 1-3 alone to export working proxies for manual use
Features
- Clean CLI menus with banners and Cyberpunk vibes
- Multi-source IP block extraction
- Blazing fast scanning with masscan
- Proxy validation against live domains
- Proxy-based scanning with nuclei or feroxbuster
- Organized result folders by domain
- Modular — use only what you need
- Custom tool integration ready
- Installer scripts for macOS and Kali Linux
- Works on most modern UNIX-like systems
Modules
| Module | Script | Purpose |
| 1 | 01_get_country_netblocks.sh | Get full IPv4 blocks for a country |
| 2 | 02_massscan_zombies.sh | Scan IPs for open proxy ports |
| 3 | 03_proxy_validator.sh | Test which proxies work with a real target |
| 4 | 04_cf_bypass_scanner.sh | Scan using validated proxies |
Installation
git clone https://github.com/blackhatethicalhacking/CF-GeoBypasser-Cyberpunk-Framework.git
cd CF-GeoBypasser-Cyberpunk-Framework
Install Requirements
Option 1: Use Included Scripts
On Kali Linux
chmod +x install_requirements_for_kali_linux.sh ./install_requirements_for_kali_linux.sh
On macOS
chmod +x install_requirements_for_macos.sh ./install_requirements_for_macos.sh
Option 2: Manual Setup
Read requirements_readme.txt for full manual installation instructions.
Run the Framework
chmod +x CF-GeoBypasser-Cyberpunk-Framework.sh ./CF-GeoBypasser-Cyberpunk-Framework.sh
Disclaimer
This tool is for Educational and Authorized Testing Only. You are responsible for how you use it. Only run this framework on targets you have explicit permission to test.
Clone the repo from here: GitHub Link








