Reverse transparent protocol agnostic socks proxy.
☆17Jan 14, 2020Updated 6 years ago
Alternatives and similar repositories for reverse-proxy
Users that are interested in reverse-proxy are comparing it to the libraries listed below
Sorting:
- OpenWrt Radius Server Management☆11Aug 11, 2015Updated 10 years ago
- A config-compatible C implementation of the UCI firewall for OpenWrt/LEDE☆14Oct 26, 2017Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Simple socks 5 server in python. Has no additional dependencies.☆10Mar 24, 2011Updated 14 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- Pivoting framework☆16Jun 5, 2016Updated 9 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 10 years ago
- Interactive workshop for using Falco, a security tool in the CNCF☆10Jan 22, 2021Updated 5 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Just a random collection of Lua snippets I find interesting or have authored myself☆26Apr 8, 2014Updated 11 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- A better skills manager☆49Updated this week
- Meeting Manager for Jitsi using Token Auth☆18Aug 2, 2023Updated 2 years ago
- Random scripts and files I use for Android reversing☆17Feb 19, 2013Updated 13 years ago
- Tmux plugin that adds support for scriptable variables in the status line☆18Feb 1, 2018Updated 8 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago
- Simple XXE test suite generated specifically for SAML interfaces☆23May 18, 2018Updated 7 years ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Nov 10, 2016Updated 9 years ago
- Scan Onion Services for Security Issues☆11Jun 12, 2016Updated 9 years ago
- Simple script to convert tables from Oracle to MySQL☆12Oct 3, 2020Updated 5 years ago
- A HTML5 2D game engine written in CoffeeScript☆30Jun 8, 2015Updated 10 years ago
- Xcode plugin for Kiwi focused specs☆26Apr 3, 2016Updated 9 years ago
- ARM Cortex A7 Qualcomm IPQ4018 QSEE (TrustZone) exploit☆20Oct 14, 2024Updated last year
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Twitter bot made using Markov Chains and powered through nonsensical garbage from the comments section of a local newspaper☆21Jan 11, 2026Updated 2 months ago
- get a dot file from a postgres database schema☆30Jan 18, 2019Updated 7 years ago
- A ZSH plugin that provides functions which integrate & bind fuzzy finder capabilities through fzf to certain commands such as ls, man, fi…☆24Nov 23, 2023Updated 2 years ago
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 12 years ago
- This is the python wrapper for The Security Framework SRDF☆49Apr 29, 2014Updated 11 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Collection of Security Related Examples for Learning Purposes☆13Jan 29, 2016Updated 10 years ago
- shadowsocks binaries for ASUS RT-N66U (merlin)☆12Mar 14, 2016Updated 10 years ago
- ☆11Mar 16, 2024Updated 2 years ago
- The Server&Web code of doufm☆39Jan 6, 2015Updated 11 years ago
- Root takeover via signature spoofing in KernelSU☆19Oct 11, 2023Updated 2 years ago