spotproxy-project / spotproxyLinks
[USENIX Security 24] Cloud-hosted proxies/VPNs with minimal cost and maximum circumvention utility
☆23Updated 11 months ago
Alternatives and similar repositories for spotproxy
Users that are interested in spotproxy are comparing it to the libraries listed below
Sorting:
- ☆26Updated last year
- ☆28Updated last year
- ☆23Updated last year
- 5 cves of ntp 4.2.8p15 founded by me.☆12Updated 2 years ago
- SnailLoad Demo Webserver☆38Updated last year
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- Set of tools and documentation for leveraging private APNs for mobile network traffic analysis☆28Updated last year
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- some config files☆14Updated last month
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆77Updated 2 years ago
- ☆17Updated 5 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 8 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- ICMP and DNS tunneling via IPv4 and IPv6☆226Updated 10 months ago
- A command-line utility that scans for Wi-Fi networks using the 802.11 netlink API.☆34Updated 2 weeks ago
- ☆23Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- ☆85Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Lightweight WhoIs client☆23Updated 2 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated last week
- Python software that reads zone files, extract NS records, and detect cyclic dependencies☆36Updated last year
- Rust-based password mutator for brute force attacks☆13Updated 10 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 2 weeks ago