Mallory is a HTTP/HTTPS proxy over SSH tool.
Installation
go get github.com/justmao945/mallory/cmd/malloryDefault path is $HOME/.config/mallory.json, can be set when start program
mallory -config path/to/config.json
Content:
id_rsa is the path to our private key file, can be generated by ssh-keygenlocal_smart is the local address to serve HTTP proxy with smart detection of destination hostlocal_normal is similar to local_smart but send all traffic through remote SSH server without destination host detectionremote is the remote address of SSH serverblocked is a list of domains that need use proxy, any other domains will connect to their server directlyAlso Read – DrMemory : Memory Debugger for Windows, Linux, Mac & Android
{
“id_rsa”: “$HOME/.ssh/id_rsa”,
“local_smart”: “:1315”,
“local_normal”: “:1316”,
“remote”: “ssh://user@vm.me:22”,
“blocked”: [
“angularjs.org”,
“golang.org”,
“google.com”,
“google.co.jp”,
“googleapis.com”,
“googleusercontent.com”,
“google-analytics.com”,
“gstatic.com”,
“twitter.com”,
“youtube.com”
]
}
Blocked list in config file will be reloaded automatically when updated, and you can do it manually:
#send signal to reload
kill -USR2
#or use reload command by sending http request
mallory -reload
System config
localhost with port 1315 to use with block listhttp_proxy and https_proxy to localhost:1316 for terminal usageGet the right suffix name for a domain
mallory -suffix www.google.com
A simple command to forward all traffic for the given port
#install it: go get github.com/justmao945/mallory/cmd/forward
#all traffic through port 20022 will be forwarded to destination.com:22
forward -network tcp -listen :20022 -forward destination.com:22
#you can ssh to destination:22 through localhost:20022
ssh root@localhost -p 20022
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…