stealth / sshttp
SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.
☆875Updated last year
Alternatives and similar repositories for sshttp:
Users that are interested in sshttp are comparing it to the libraries listed below
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- Tunnel TCP over a plain HTTP session (warning: mediocre Go code)☆476Updated 4 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,000Updated 3 years ago
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,286Updated 6 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- SSH bastion/jump host/jumpserver☆570Updated 4 years ago
- Haka runtime☆450Updated 7 years ago
- IP-over-ICMP tunnel☆149Updated 2 months ago
- IP over ICMP☆452Updated 8 months ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Updated 8 years ago
- Run SSH and HTTP(S) on the same port☆903Updated 6 years ago
- secure parasitic rdate replacement☆366Updated 7 years ago
- A Linux packet crafting tool.☆468Updated 4 years ago
- A transparent proxy that can modify and drop traffic for arbitrary TCP connections.☆275Updated 5 years ago
- netfilter (iptables) target for high performance lockless SYN cookies for SYN flood mitigation☆429Updated 6 years ago
- opmsg message encryption☆753Updated 2 years ago
- Perform network trace of a single process by using network namespaces.☆534Updated 3 years ago
- A tool for automated MITM attacks on SSL connections.☆556Updated 7 years ago
- A fast DNS server based on C10M principles☆608Updated 9 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆463Updated 10 months ago
- Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.☆283Updated 7 years ago
- a source code for DNS over HTTP implementation☆165Updated 6 years ago
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆673Updated 6 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- Quantum Insert detector/recorder☆307Updated 5 years ago
- Proof of concept for CVE-2015-7547☆543Updated 9 years ago
- It allows TCP/UDP/ICMP traffic over UDP tunneling. It's useful to avoid Internet restrictions.☆694Updated 2 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆436Updated 7 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago