Mallory is a HTTP/HTTPS proxy over SSH tool.
Installation
go get github.com/justmao945/mallory/cmd/mallory
Default path is $HOME/.config/mallory.json
, can be set when start program
mallory -config path/to/config.json
Content:
id_rsa
is the path to our private key file, can be generated by ssh-keygen
local_smart
is the local address to serve HTTP proxy with smart detection of destination hostlocal_normal
is similar to local_smart
but send all traffic through remote SSH server without destination host detectionremote
is the remote address of SSH serverblocked
is a list of domains that need use proxy, any other domains will connect to their server directlyAlso Read – DrMemory : Memory Debugger for Windows, Linux, Mac & Android
{
“id_rsa”: “$HOME/.ssh/id_rsa”,
“local_smart”: “:1315”,
“local_normal”: “:1316”,
“remote”: “ssh://user@vm.me:22”,
“blocked”: [
“angularjs.org”,
“golang.org”,
“google.com”,
“google.co.jp”,
“googleapis.com”,
“googleusercontent.com”,
“google-analytics.com”,
“gstatic.com”,
“twitter.com”,
“youtube.com”
]
}
Blocked list in config file will be reloaded automatically when updated, and you can do it manually:
#send signal to reload
kill -USR2
#or use reload command by sending http request
mallory -reload
System config
localhost
with port 1315
to use with block listhttp_proxy
and https_proxy
to localhost:1316
for terminal usageGet the right suffix name for a domain
mallory -suffix www.google.com
A simple command to forward all traffic for the given port
#install it: go get github.com/justmao945/mallory/cmd/forward
#all traffic through port 20022 will be forwarded to destination.com:22
forward -network tcp -listen :20022 -forward destination.com:22
#you can ssh to destination:22 through localhost:20022
ssh root@localhost -p 20022
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…