stealth / sshttpLinks
SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.
☆880Updated 2 years ago
Alternatives and similar repositories for sshttp
Users that are interested in sshttp are comparing it to the libraries listed below
Sorting:
- IP over ICMP☆457Updated last year
- A port-knocking daemon☆593Updated last year
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Haka runtime☆450Updated 7 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,643Updated 4 years ago
- Current development of SSLyze now takes place on a separate repository☆646Updated 9 years ago
- IP-over-ICMP tunnel☆148Updated 6 months ago
- Stealth tunneling through HTTP(S) proxies☆501Updated 3 months ago
- Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.☆335Updated 2 years ago
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,286Updated 6 years ago
- secure parasitic rdate replacement☆368Updated 7 years ago
- A transparent proxy that can modify and drop traffic for arbitrary TCP connections.☆276Updated 5 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,007Updated 4 years ago
- Poor mans VPN over SSH☆134Updated 2 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- A fast DNS server based on C10M principles☆608Updated 9 years ago
- Grab ssh keys from ssh-agent☆222Updated 5 years ago
- opmsg message encryption☆753Updated 2 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆790Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated last year
- Bidirectional data stream tunnelled in HTTP requests.☆424Updated 2 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆308Updated 3 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- netfilter (iptables) target for high performance lockless SYN cookies for SYN flood mitigation☆431Updated 7 years ago
- Automated Linux evil maid attack☆429Updated 9 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆218Updated 8 years ago
- uber's ssh certificate pam module☆858Updated 2 years ago
- DNS Reverse Proxy☆190Updated 4 months ago