Dragon2fly / vpngate-with-proxyView external linksLinks
vpn gate client for linux, be able to connect to open vpn server through proxy
☆271Jun 13, 2025Updated 8 months ago
Alternatives and similar repositories for vpngate-with-proxy
Users that are interested in vpngate-with-proxy are comparing it to the libraries listed below
Sorting:
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Proof of Work protected TCP server.☆29Nov 8, 2023Updated 2 years ago
- This program is written in Python. It sorts all files by their formats.☆11Apr 19, 2020Updated 5 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Nov 15, 2023Updated 2 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆79Jan 3, 2024Updated 2 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- exploit for cve-2023-47246 SysAid RCE (shell upload)☆53Dec 7, 2023Updated 2 years ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- Battery management GUI utility for some supported Asus laptops using linux.☆16Jun 4, 2022Updated 3 years ago
- A checker designed in Python 3 for checking proxy.☆79Sep 30, 2021Updated 4 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Nov 22, 2024Updated last year
- A proof of concept for CVE-2023–1326 in apport-cli 2.26.0☆21Dec 6, 2023Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- needjs is a module that will help you satisfy your needs and handles their requirement.☆14Oct 29, 2020Updated 5 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- machine learning visualization tools in the terminal☆33Aug 1, 2022Updated 3 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- Installation automatique de Nagios depuis les sources☆21Feb 28, 2014Updated 11 years ago
- WebIDL parser/generator for ruby☆23Sep 3, 2018Updated 7 years ago
- Python script to automatically login to MikroTik Proxy server☆16Feb 9, 2021Updated 5 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆15Nov 24, 2023Updated 2 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Command-line JSON5 to JSON converter☆10May 25, 2017Updated 8 years ago
- Lightweight package for interacting with ChatGPT's API by OpenAI. Uses reverse engineered official API.☆16Dec 11, 2022Updated 3 years ago
- Warp+Psiphon, an anti censorship utility for iran☆10Jul 17, 2024Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆131Jun 1, 2024Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆42Nov 4, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- A tool that automates MAC address and hostname spoofing☆61Sep 6, 2019Updated 6 years ago
- ☆31Jul 14, 2022Updated 3 years ago