Showing 141 open source projects for "proxy"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • BoldTrail Real Estate CRM Icon
    BoldTrail Real Estate CRM

    A first-of-its-kind homeownership solution that puts YOU at the center of the coveted lifetime consumer relationship.

    BoldTrail, the #1 rated real estate platform, is built to power your entire brokerage with next-generation technology your agents will use and love. Showcase your unique brand with customizable websites for your company, offices, and every agent. Maximize lead capture with a modern, portal-like consumer search experience and intelligent behavior tracking. Hyper-local area pages, home valuation pages and options for rich lifestyle data keep customers searching with your brokerage as the local experts. The most robust lead gen tools on the market help your brokerage, teams & agents effectively drive new business - no matter their budget. Empower your agents to generate free leads instantly with our simple to use landing pages & IDX squeeze pages. Drive more leads with higher quality and lower cost through in-house tools built within the platform. Diversify lead sources with our automated social media posting, integrated Google and Facebook advertising, custom text codes and more.
    Learn More
  • 1
    V2RayCloudSpider

    V2RayCloudSpider

    V2RayCloudSpider

    V2RSS is an "ecological mining machine" that can perform vertical mining on global providers based on the SSPanel-Uim framework; it can generate bottom-up "aggregation collection" tasks for mainstream protocol headers; it can self-digest and Compared with proxypool , the output is purer and more reliable proxy nodes; it has powerful production features such as self-discovery and service self-healing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    proxy-ping

    proxy-ping

    Tool to ping hosts through firewalls blocking ICMP

    The utility `ProxyPing` is a simple tool to ping servers behind a firewall that will not let ICMP packages through. It provides a HTTP server answering to ping requests and returning the ping delay as a HTTP text result. The tool will have to be deployed on a server behind the firewall that can be reached by a configurable TCP connection (defaulting to port TCP 6666).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    youtube-dl

    youtube-dl

    Download videos from YouTube (and more sites)

    youtube-dl is a command-line program to download videos from YouTube and a few more sites. It requires the Python interpreter (2.6, 2.7, or 3.2+), and it is not platform specific. We also provide a Windows executable that includes Python. youtube-dl should work in your Unix box, in Windows or in Mac OS X. It is released to the public domain, which means you can modify it, redistribute it or use it however you like. youtube-dl is a powerful, open-source command-line program designed to...
    Downloads: 180 This Week
    Last Update:
    See Project
  • 4
    Nameko

    Nameko

    Python framework for building microservices

    ...Simply use the built-in extensions, build your own or leverage the community. Nameko includes an implementation of RPC over AMQP. It comprises the @rpc entry point, a proxy for services to talk to other services, and a standalone proxy that non-Nameko clients can use to make RPC calls to a cluster. The HTTP entry point is built on top of werkzeug, and supports all the standard HTTP methods (GET/POST/DELETE/PUT etc).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 5
    googler

    googler

    Google Search, Google Site Search, Google News from the terminal

    googler is a power tool to Google (Web & News) and Google Site Search from the command-line. It shows the title, URL and abstract for each result, which can be directly opened in a browser from the terminal. Results are fetched in pages (with page navigation). Supports sequential searches in a single googler instance. googler was initially written to cater to headless servers without X. You can integrate it with a text-based browser. However, it has grown into a very handy and flexible...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Streisand

    Streisand

    Streisand sets up a new server running your choice

    ...It was created to help users bypass internet censorship and surveillance by quickly setting up secure communication channels without needing deep system administration expertise. With just a cloud provider account and basic Unix command-line knowledge, Streisand can provision a server and configure multiple VPN and proxy protocols almost automatically. This includes OpenVPN, WireGuard, Shadowsocks, OpenConnect, and Tor bridges, often with optional add-ons like obfuscation or stunnel to resist throttling and detection. The result is a private website that hosts client software downloads and setup instructions for easy access. Streisand supports major cloud providers like AWS, Azure, Google Cloud, Linode, DigitalOcean, and Rackspace, while also offering installation options for advanced users with their own servers.
    Downloads: 1,230 This Week
    Last Update:
    See Project
  • 7
    cintruder

    cintruder

    CIntruder - OCR Bruteforcing Toolkit

    Captcha Intruder is an automatic pentesting tool to bypass captchas. -> CIntruder-v0.4 (.zip) -> md5 = 6326ab514e329e4ccd5e1533d5d53967 -> CIntruder-v0.4 (.tar.gz) ->md5 = 2256fccac505064f3b84ee2c43921a68 --------------------------------------------
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    v2rayL

    v2rayL

    v2ray linux GUI

    V2Ray is a tool under Project V. Project V includes a series of tools to help you create your own customized network system. And V2Ray belongs to the core one. Simply put, V2Ray is a proxy software similar to Shadowsocks, but has more advantages than Shadowsocks.v2ray linux client, using pyqt5 to write GUI interface, the core is based on v2ray-core (v2ray-linux-64) vmess supports websocket, mKcp, and tcp. There may be some bugs in the current program, but they have not been tested. If you find bugs during use, please submit them in issue for improvement. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Python Patterns

    Python Patterns

    A collection of design patterns/idioms in Python

    ...It’s intended for learners or developers interested in software architecture or design, rather than as a production library. Includes pattern examples for testability, delegation, flyweight, proxy, etc., plus patterns outside the classical set (registry, specification, etc.) Each pattern has readable example code, often in its own module/file, sometimes showing more than one implementation style.
    Downloads: 0 This Week
    Last Update:
    See Project
  • HOA Software Icon
    HOA Software

    Smarter Community Management Starts Here

    Simplify HOA management with software that handles everything from financials to communication.
    Learn More
  • 10
    PivotSuite

    PivotSuite

    Network Pivoting Toolkit

    PivotSuite is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. If the compromised host is directly accessible (Forward Connection) from Our pentest machine, Then we can run pivotsuite as a server on the compromised machine and access the different subnet hosts from our pentest machine, Which was...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Jupyter Server Proxy

    Jupyter Server Proxy

    Jupyter notebook server extension to proxy web services.

    Jupyter Server Proxy lets you run arbitrary external processes (such as RStudio, Shiny Server, Syncthing, PostgreSQL, Code Server, etc) alongside your notebook server and provide authenticated web access to them using a path like /rstudio next to others like /lab. Alongside the Python package that provides the main functionality, the JupyterLab extension (@jupyterhub/jupyter-server-proxy) provides buttons in the JupyterLab launcher window to get to RStudio for example.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    WiFi-Pumpkin

    WiFi-Pumpkin

    WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack

    The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security check the list of features is quite broad.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 13
    howmanypeoplearearound

    howmanypeoplearearound

    Count the number of people around you by monitoring wifi signals

    howmanypeoplearearound calculates the number of people in the vicinity using the approximate number of smartphones as a proxy (since ~70% of people have smartphones nowadays). A cellphone is determined to be in proximity to the computer based on sniffing WiFi probe requests. Possible uses of howmanypeoplearearound include, monitoring foot traffic in your house with Raspberry Pis, seeing if your roommates are home, etc. There are a number of possible USB WiFi adapters that support monitor mode. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Appupdater
    Appupdater provides advanced functionality to Windows, similar to apt-get or yum on Linux. It automates the process of installing and maintaining up to date versions of programs. It is fully customizable for use in a corporate environment.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 15

    PentDroid

    Small tool for apk operations required during android app pentesting

    Tools consist of mini modules which automates and reduces tester efforts for setting up the basic environment and typing long tool queries . For Installation guide refer : https://github.com/vishwaraj/PentDroid/blob/master/README.md
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    FortWrap is a python script that parses Fortran 90/95/200X source files and generates wrapper code in the form of C++ classes. FortWrap is intended to be used with object oriented Fortran code that makes use of Fortran derived types. Project has moved to: https://github.com/mcfarljm/fortwrap
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    SNMP library for Python
    SNMP v1/v2c/v3 engine and apps written in pure-Python. Project moved to GitHub: https://github.com/etingof/pysnmp
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18

    SNMP proxy forwarder

    Highly configurable SNMPv1/v2c/v3 application-level proxy

    Project moved to GitHub: https://github.com/etingof/snmpfwd
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    nogotofail

    nogotofail

    An on-path blackbox network traffic security testing tool

    nogotofail is a network security testing tool developed by Google to help developers and researchers identify weaknesses in TLS/SSL implementations and detect unencrypted traffic that could compromise sensitive data. The tool functions as an on-path man-in-the-middle (MiTM) testing system, allowing users to inspect and evaluate how applications and devices handle encrypted connections under real-world conditions. It can detect a wide range of vulnerabilities, including improper SSL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    MITMf

    MITMf

    Framework for Man-In-The-Middle attacks

    ...The framework contains a built-in SMB, HTTP and DNS server that can be controlled and used by the various plugins, it also contains a modified version of the SSLStrip proxy that allows for HTTP modification and a partial HSTS bypass. As of version 0.9.8, MITMf supports active packet filtering and manipulation (basically what better filters did, only better), allowing users to modify any type of traffic or protocol. The configuration file can be edited on-the-fly while MITMf is running, the changes will be passed down through the framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    anontwi

    anontwi

    AnonTwi: tool to have more privacy on social networking sites related

    AnonTwi provides you: + AES + HMAC-SHA1 encryption on Tweets and Direct Messages + Secure Sockets Layer (SSL) to interact with API + Proxy Socks (for example, to connect to the TOR network) + Random HTTP header values + Send long messages splitted automatically + Automatic decryption of tweet's urls or raw inputs + Backup messages to your disk (max: 3200) + Send fake geolocation places + Remove data and close account (suicide!) ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Multi Whois Client
    Multi Whois is a small whois domain name search program capable of finding bulk domains via a wordlist file or specific domains provided by the user. It's a good way to search for domains that are available to buy. The wordlist format consists of a domain name per line with or without the .dot tld.. Examples below google yahoo foobar Note:Must select a tld from the dropdown box or google.com yahoo.net foobar.guru
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ASSP Server Project
    The Anti-Spam SMTP Proxy (ASSP) Server project aims to create an open source platform-independent SMTP Proxy server which implements auto-whitelists, self learning Bayesian, Greylisting, DNSBL, DNSWL, URIBL, SPF, SRS, Backscatter, Virus scanning, attachment blocking, Senderbase and multiple other filter methods. Click 'Browse all files' to download the professional version 2.4.3 build 14313.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Wireless Attack Toolkit (WAT)

    Wireless Attack Toolkit (WAT)

    A push-button wireless hacking and Man-in-the-Middle attack toolkit

    ...Some of the tools included in the kit are: Custom regex-based DNS Server DHCP Aircrack-ng suite Browser Exploitation Framework (Preconfigured for metasploit) Metasploit Python-based Transparent Injection Proxy Pushbutton configuration "Limpet Mine" mode for attacking existing networks You basically answer three questions in the start script, wait a bit, then log into the BEEF console to start attacking clients
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    NNTP2NNTP Proxy

    NNTP2NNTP is a simple and pretty fast NNTP proxy server

    NNTP2NNTP Proxy allow you to use your NNTP Account from multiple systems, each with own user name and password. It fully supports SSL and you can also limit the access to proxy with SSL certificates. NNTP2NNTP Proxy is very simple and pretty fast. An nntp uploader is also included.
    Downloads: 0 This Week
    Last Update:
    See Project