cyrus-and / gproxyLinks
googleusercontent.com as HTTP(S) proxy
☆54Updated 4 years ago
Alternatives and similar repositories for gproxy
Users that are interested in gproxy are comparing it to the libraries listed below
Sorting:
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆27Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- A proxy for encrypting TCP connections.☆11Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- ☆128Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago