-
Updated
May 23, 2020 - Go
transparent-proxy
Here are 61 public repositories matching this topic...
-
Updated
Nov 20, 2019 - JavaScript
-
Updated
May 6, 2020 - Go
关于自动 ssl
简单看了一下代码,发现 ssl 自动那个不太自动。
是否可以实现像 caddy 那样的?提供域名就行,启动caddy后就自动获取证书了。
好像有些难度,我不了解 trojan 协议,能否这样改:
用 http 监听端口,用 certmagic 或者 autocert 获取证书,然后在 http.Handler 里面 hijack 拿到 connection, 再处理 trojan 协议。
这样再外层就是一个 http server, 不是现在的 trojan tcp server. 不知道是否可行。
@p4gefau1t
-
Updated
Mar 11, 2020 - Shell
bannedregexpurllist:
котик
kitty
e2guardian.conf:
weightedphrasemode = 1
phrasefiltermode = 2
preservecase = 2
hexdecodecontent = off
forcequicksearch = on
When I visit, for example, http://blank.org/?котик - request is blocked, all ok. But when I visit http://blank.org/?КОТИК or http://blank.org/?Котик - all passes.
When I enter http://blank.org/?kitty or http://bl
-
Updated
Oct 14, 2017 - Python
-
Updated
Dec 13, 2019 - C++
-
Updated
Jul 26, 2019 - Go
-
Updated
May 23, 2020 - C
-
Updated
Apr 18, 2020 - Shell
-
Updated
Nov 5, 2019 - Shell
-
Updated
Nov 11, 2017 - C++
-
Updated
May 20, 2019
-
Updated
Oct 13, 2019 - Shell
-
Updated
Jan 20, 2020 - TypeScript
Document offline coverity build process:
- Need build tools command prompt + cov-build in PATH
- Travis-CI doesn't support this with .NET core presently
- SonarQube analysis process (offline server, but need a way to export issues into Github tickets if possible)
- Codacity (pretty sure this is automatic)
- May be able to move coverity auto-build over to AppVeyor by issuing custom comman
-
Updated
May 1, 2020 - Go
-
Updated
Feb 9, 2019 - Solidity
-
Updated
May 25, 2020 - C
-
Updated
Jun 20, 2019 - Go
-
Updated
May 25, 2020 - C++
Improve this page
Add a description, image, and links to the transparent-proxy topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the transparent-proxy topic, visit your repo's landing page and select "manage topics."
HTTP mode header manipulation, such as stripping headers potentially problematic for MitM attacks, is currently hardcoded within the
http/httpsmodes. Make each optional header manipulation configurable on both the command line and the config file.Tasks: