stealth / sshttpLinks
SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.
☆882Updated 2 years ago
Alternatives and similar repositories for sshttp
Users that are interested in sshttp are comparing it to the libraries listed below
Sorting:
- IP over ICMP☆459Updated last year
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- A port-knocking daemon☆596Updated last year
- Secure Socket Funneling - Network tool and toolkit - TCP and UDP port forwarding, SOCKS proxy, remote shell, standalone and cross platfor…☆1,647Updated 4 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 10 years ago
- Haka runtime☆450Updated 7 years ago
- A transparent proxy that can modify and drop traffic for arbitrary TCP connections.☆276Updated 5 years ago
- IP-over-ICMP tunnel☆148Updated 6 months ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,006Updated 4 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- opmsg message encryption☆753Updated 2 years ago
- netfilter (iptables) target for high performance lockless SYN cookies for SYN flood mitigation☆432Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- A Linux packet crafting tool.☆469Updated 4 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆790Updated 3 years ago
- SSH bastion/jump host/jumpserver☆570Updated 4 years ago
- Grab ssh keys from ssh-agent☆223Updated 5 years ago
- Current development of SSLyze now takes place on a separate repository☆646Updated 10 years ago
- Bidirectional data stream tunnelled in HTTP requests.☆425Updated 2 years ago
- secure parasitic rdate replacement☆369Updated 7 years ago
- Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.☆336Updated 2 years ago
- It allows TCP/UDP/ICMP traffic over UDP tunneling. It's useful to avoid Internet restrictions.☆698Updated 3 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆309Updated 3 years ago
- OZ: a sandboxing system targeting everyday workstation applications☆438Updated 7 years ago
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,286Updated 6 years ago
- uber's ssh certificate pam module☆858Updated 2 years ago
- A daemon, running in background on a Linux router or firewall, monitoring the state of multiple internet uplinks/providers and changing t…☆184Updated 4 years ago
- Scan SSH ciphers☆161Updated last year
- Automated Linux evil maid attack☆432Updated 9 years ago