brunoborges / ssh-over-http-proxy
☆13Updated 12 years ago
Alternatives and similar repositories for ssh-over-http-proxy:
Users that are interested in ssh-over-http-proxy are comparing it to the libraries listed below
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Layer 2 VPN using a tap device on one end and pcap on the other☆10Updated 6 years ago
- A privilege escalation detection and prevention system for GNU/Linux hosts☆12Updated 12 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Updated 10 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Generate list of IP addresses from a network specification☆25Updated 2 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- Clean your RHEL 6.x COW, it's dirty☆7Updated 3 years ago
- CloudFlare Worker Shell☆13Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 3 months ago
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- Community-based CybergON-powered Suricata rules☆12Updated 2 years ago
- detects several virtualizations☆44Updated 9 years ago
- ☆14Updated 6 years ago
- Python library for image hashing and deduplication☆11Updated 8 years ago
- Simulates a logged in user.☆16Updated 6 months ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Updated 9 years ago
- Vim/Neovim Arbitrary Code Execution via Modelines (CVE-2019-12735)☆9Updated 5 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Minimalistic DNS logging tool☆43Updated 3 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- IronBee Rules☆19Updated 11 years ago
- Mirror network traffic from one interface to another on Windows☆25Updated 4 years ago