cyrus-and / gproxy
googleusercontent.com as HTTP(S) proxy
☆54Updated 4 years ago
Alternatives and similar repositories for gproxy:
Users that are interested in gproxy are comparing it to the libraries listed below
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- ☆12Updated 8 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Mass scanning and fuzzing library☆49Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- ☆27Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆60Updated 6 years ago
- python tor client☆27Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- ☆53Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Threatbutt Suite☆37Updated 9 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 10 years ago