Mallory is a HTTP/HTTPS proxy over SSH tool.
Installation
go get github.com/justmao945/mallory/cmd/mallory
Default path is $HOME/.config/mallory.json
, can be set when start program
mallory -config path/to/config.json
Content:
id_rsa
is the path to our private key file, can be generated by ssh-keygen
local_smart
is the local address to serve HTTP proxy with smart detection of destination hostlocal_normal
is similar to local_smart
but send all traffic through remote SSH server without destination host detectionremote
is the remote address of SSH serverblocked
is a list of domains that need use proxy, any other domains will connect to their server directlyAlso Read – DrMemory : Memory Debugger for Windows, Linux, Mac & Android
{
“id_rsa”: “$HOME/.ssh/id_rsa”,
“local_smart”: “:1315”,
“local_normal”: “:1316”,
“remote”: “ssh://user@vm.me:22”,
“blocked”: [
“angularjs.org”,
“golang.org”,
“google.com”,
“google.co.jp”,
“googleapis.com”,
“googleusercontent.com”,
“google-analytics.com”,
“gstatic.com”,
“twitter.com”,
“youtube.com”
]
}
Blocked list in config file will be reloaded automatically when updated, and you can do it manually:
#send signal to reload
kill -USR2
#or use reload command by sending http request
mallory -reload
System config
localhost
with port 1315
to use with block listhttp_proxy
and https_proxy
to localhost:1316
for terminal usageGet the right suffix name for a domain
mallory -suffix www.google.com
A simple command to forward all traffic for the given port
#install it: go get github.com/justmao945/mallory/cmd/forward
#all traffic through port 20022 will be forwarded to destination.com:22
forward -network tcp -listen :20022 -forward destination.com:22
#you can ssh to destination:22 through localhost:20022
ssh root@localhost -p 20022
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…