hkparker / proxydLinks
proxyd proxies data between TCP, TLS, and unix sockets
☆21Updated 8 years ago
Alternatives and similar repositories for proxyd
Users that are interested in proxyd are comparing it to the libraries listed below
Sorting:
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- ☆16Updated 10 years ago
- pwntools for go!☆12Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Updated 9 years ago
- Rosie the Pivoter☆17Updated 7 years ago
- A reverse socks5 proxy server and client☆18Updated 8 years ago
- ☆18Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- "HeaderScan" Burp Plugin☆16Updated 11 years ago
- A simple SOCKS5 server written in Go☆31Updated 9 years ago
- AV Bypass☆29Updated 7 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 8 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- CVE-2017-8570 Exploit☆21Updated 8 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Socks5 server over Websockets☆40Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- Run commands over RDP on massive number of hosts☆11Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Updated 7 years ago
- rev shell and manager in go☆20Updated 5 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 15 years ago
- A framework for creating modular bots/backdoors☆21Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago