GrrrDog / Weird_proxies
Reverse proxies cheatsheet
Stars: ✭ 701
Projects that are alternatives of or similar to Weird proxies
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+402.28%)
Mutual labels: cheatsheet, pentesting
Pentesting Cookbook
A set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-88.3%)
Mutual labels: cheatsheet, pentesting
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+24.11%)
Mutual labels: cheatsheet, pentesting
Huge Collection Of Cheatsheet
Share of my Huge Collection of Cheatsheet (Coding, Cheat, Pinouts, Command Lists, Etc.)
Stars: ✭ 250 (-64.34%)
Mutual labels: cheatsheet, pentesting
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+178.03%)
Mutual labels: cheatsheet, pentesting
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+98.57%)
Mutual labels: cheatsheet, pentesting
HOUDINI
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Stars: ✭ 791 (+12.84%)
Mutual labels: cheatsheet, pentesting
Mitm Cheatsheet
All MITM attacks in one place.
Stars: ✭ 467 (-33.38%)
Mutual labels: cheatsheet, pentesting
Frontend Cheat Sheets
Collection of cheat sheets(HTML, CSS, JS, Git, Gulp, etc.,) for your frontend development needs & reference
Stars: ✭ 604 (-13.84%)
Mutual labels: cheatsheet
Golang Cheat Sheet
An overview of Go syntax and features.
Stars: ✭ 6,066 (+765.34%)
Mutual labels: cheatsheet
Xsser
Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
Stars: ✭ 606 (-13.55%)
Mutual labels: pentesting
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+881.74%)
Mutual labels: pentesting
Hashview
A web front-end for password cracking and analytics
Stars: ✭ 601 (-14.27%)
Mutual labels: pentesting
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-3.42%)
Mutual labels: pentesting
Spike
📣 A fast reverse proxy written in PHP that helps to expose local services to the internet
Stars: ✭ 582 (-16.98%)
Mutual labels: reverse-proxy
Awesome Network Stuff
Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
Stars: ✭ 578 (-17.55%)
Mutual labels: reverse-proxy
Py2rs
A quick reference guide for the Pythonista in the process of becoming a Rustacean
Stars: ✭ 690 (-1.57%)
Mutual labels: cheatsheet
Gorsair
Gorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (-3.28%)
Mutual labels: pentesting
Weird Proxies
It's a cheat sheet about behaviour of various reverse proxies and related attacks.
It is a result of analysis of various reverse proxies, cache proxies, load balancers, etc. The article (https://www.acunetix.com/blog/articles/a-fresh-look-on-reverse-proxy-related-attacks/) describes the goals of the research and how you can use the cheat sheet.
Analyzed stuff:
Additional:
- Browsers
Related articles/white papers/presentations:
- Reverse proxies & Inconsistency
- Attacking Secondary Contexts in Web Applications
- Hacking Starbucks and Accessing Nearly 100 Million Customer Records
- HTTP.ninja
- Server Technologies - Reverse Proxy Bypass
- Cracking the lens: targeting HTTP's hidden attack-surface
- Abusing HTTP hop-by-hop request headers
- Smuggling HTTP headers through reverse proxies
- At Home Among Strangers
- h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)
- What’s wrong with WebSocket APIs? Unveiling vulnerabilities in WebSocket APIs
- HTTP Desync Attacks: Request Smuggling Reborn
- Cache poisoning and other dirty tricks
- Practical Web Cache Poisoning
- Web Cache Entanglement: Novel Pathways to Poisoning
- CPDoS: Cache Poisoned Denial of Service
- The Case of the Missing Cache Keys
- Responsible denial of service with web cache poisoning
- Cache Poisoning Denial-of-Service Attack Techniques
- Cache-Key Normalization DoS
- Web Cache Deception Attack
- Cached and Confused: Web Cache Deception in the Wild
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].