stealth / sshttpLinks
SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.
☆888Updated 2 years ago
Alternatives and similar repositories for sshttp
Users that are interested in sshttp are comparing it to the libraries listed below
Sorting:
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆349Updated 3 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆377Updated 4 years ago
- A port-knocking daemon☆606Updated last year
- IP-over-ICMP tunnel☆148Updated 10 months ago
- Probably one of the smallest SSL MITM proxies you can make☆183Updated 10 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,006Updated 4 years ago
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,657Updated 4 years ago
- Stealth tunneling through HTTP(S) proxies☆524Updated last month
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆468Updated last year
- Bidirectional data stream tunnelled in HTTP requests.☆427Updated 2 years ago
- SSH bastion/jump host/jumpserver☆572Updated 4 years ago
- A transparent proxy that can modify and drop traffic for arbitrary TCP connections.☆276Updated 6 years ago
- Grab ssh keys from ssh-agent☆222Updated 5 years ago
- Scan SSH ciphers☆160Updated last year
- Current development of SSLyze now takes place on a separate repository☆647Updated 10 years ago
- Check your DNS against over 1000 global DNS servers☆948Updated 6 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- An intercepting proxy for web application testing☆411Updated 7 years ago
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,292Updated 6 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆938Updated 3 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆788Updated 3 years ago
- Haka runtime☆449Updated 8 years ago
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆684Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.☆338Updated 2 years ago
- A Linux packet crafting tool.☆472Updated 5 years ago
- It allows TCP/UDP/ICMP traffic over UDP tunneling. It's useful to avoid Internet restrictions.☆703Updated 3 years ago
- Best Current Practices regarding secure online communication and configuration of services using cryptography.☆702Updated 3 years ago
- A tool for automated MITM attacks on SSL connections.☆564Updated 8 years ago