staaldraad / tcpproxLinks
Simple TCP proxy. Allows you to intercept/inspect TCP traffic.
☆109Updated last year
Alternatives and similar repositories for tcpprox
Users that are interested in tcpprox are comparing it to the libraries listed below
Sorting:
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆61Updated this week
- DNS Reverse Proxy☆190Updated last week
- Small portable SSH server in Go.☆142Updated last year
- This is a kernel module invoked reverse shell proof of concept.☆71Updated 5 years ago
- A transparent proxy that can modify and drop traffic for arbitrary TCP connections.☆276Updated 5 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆214Updated 4 months ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆110Updated 6 years ago
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆163Updated 2 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 9 months ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆88Updated 4 months ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- Cross platform retrieval of system proxy configurations☆58Updated 2 weeks ago
- VirtualBox Disk Image Encryption password cracker☆33Updated 9 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 4 years ago
- Freki is a tool to manipulate packets in usermode using NFQUEUE and golang.☆58Updated 2 years ago
- [ceased maintenance] An open source alternative to burp suite written in Go.☆156Updated 6 years ago
- A Golang covert backdoor using raw sockets.☆36Updated 6 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆71Updated 5 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 3 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆65Updated 6 years ago
- Little bit of this, little bit of that☆90Updated 2 weeks ago
- JEB scripts for Golang executables analysis☆131Updated 5 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- ☆22Updated 8 years ago
- elf-strings will programmatically read an ELF binary's string sections within a given binary. This is meant to be much like the strings U…☆140Updated 7 years ago
- export mitmproxy traffic to PCAP file☆57Updated last year
- Reverse shell and rootkit☆19Updated 8 years ago
- Reverse shell over SSH☆38Updated 9 years ago
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆108Updated 9 years ago
- Layer 4 Single Packet Authentication Linux kernel module utilizing Netfilter hooks and kernel supported Berkeley Packet Filters (BPF)☆114Updated last year