cyrus-and / gproxyLinks
googleusercontent.com as HTTP(S) proxy
☆54Updated 4 years ago
Alternatives and similar repositories for gproxy
Users that are interested in gproxy are comparing it to the libraries listed below
Sorting:
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- ☆27Updated 7 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Host files with DNS☆32Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Security scripts and programs I've made☆8Updated 10 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- Scoreboard for CTF Competitions☆27Updated 8 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago