spotproxy-project / spotproxyLinks
[USENIX Security 24] Cloud-hosted proxies/VPNs with minimal cost and maximum circumvention utility
☆22Updated 6 months ago
Alternatives and similar repositories for spotproxy
Users that are interested in spotproxy are comparing it to the libraries listed below
Sorting:
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated last year
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆16Updated 2 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 3 years ago
- Clone network interface from one host as a tap interface on another host☆60Updated 4 years ago
- SnailLoad Demo Webserver☆37Updated 7 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆74Updated last year
- Notes and receipts (PCAPs) for TCP and ICMP Noise Storms☆50Updated 11 months ago
- Detection Rule License (DRL)☆19Updated 8 months ago
- Network Cryptography Monitor - using eBPF, written in python☆35Updated last week
- ☆26Updated last year
- ☆17Updated 5 years ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆15Updated last month
- ☆17Updated 2 years ago
- some config files☆12Updated 2 weeks ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 5 months ago
- Hunt for SQLite files used by various applications☆26Updated this week
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Script fingerprinting systems based on shodan.io data☆13Updated 7 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 2 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- ☆20Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Updated 2 years ago
- ☆82Updated 2 years ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Updated 7 months ago
- Rust-based password mutator for brute force attacks☆13Updated 5 months ago
- Exploring various defensive response options for effectively securing a 5G core-network☆42Updated last year
- Yubico OTP validation Slack bot☆10Updated 10 months ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆70Updated 2 years ago