Shadowsocks-like proxy written in Go
☆37Dec 18, 2019Updated 6 years ago
Alternatives and similar repositories for tcp-over-http
Users that are interested in tcp-over-http are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- ☆22Feb 4, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- reverse socks tunneler with ntlm and proxy support☆29Nov 24, 2019Updated 6 years ago
- black Ip lists, dorks-collection☆17Updated this week
- http CONNECT tunnel☆10Mar 26, 2020Updated 6 years ago
- NAT打洞转发数据☆13Dec 23, 2023Updated 2 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Secure IP tunnel☆10May 25, 2014Updated 11 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ARMANDroid - anti-repackaging tool for Android apps☆16Dec 18, 2020Updated 5 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 4 years ago
- ☆23Jul 29, 2021Updated 4 years ago
- using iodine to tunnel IP via DNS☆14Feb 4, 2020Updated 6 years ago
- HTTP/HTTPS tunnel proxy server over libp2p. Supports NAT traversal. Setup VPN within seconds. Access home server from anywhere.☆14Aug 14, 2024Updated last year
- In-memory security with secure data types☆16Aug 20, 2020Updated 5 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Android ART Hook - support 4.4 - 10.0 32/64 bit - Xposed API Compat☆18Nov 4, 2024Updated last year
- Wrapper of libserialport written in V☆11Nov 21, 2021Updated 4 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆23Feb 17, 2026Updated 2 months ago
- RSS feeds created/collected by TabHub.☆17Updated this week
- ☆13Jun 17, 2022Updated 3 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆55Jul 21, 2016Updated 9 years ago
- Simple TCP over Websocket tunneling☆48Apr 22, 2025Updated last year
- ☆11Mar 11, 2019Updated 7 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Evaluation of Resource-based App Repackaging Detection in Android☆10Apr 1, 2023Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- Custom Compose Animating Dialog for Jetpack Compose UI UX.☆14Oct 8, 2022Updated 3 years ago
- 护网杯 2018 WEB (1) easy_tornado☆15Aug 22, 2019Updated 6 years ago
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Feb 8, 2022Updated 4 years ago