background preloader

HTTP Monitor / HTTP Proxy / HTTPS & SSL Proxy / Reverse Proxy

HTTP Monitor / HTTP Proxy / HTTPS & SSL Proxy / Reverse Proxy
Related:  Networks tools Tools

NetTool Scala (langage) Un article de Wikipédia, l'encyclopédie libre. Scala intègre les paradigmes de programmation orientée objet et de programmation fonctionnelle, avec un typage statique. Il concilie ainsi ces deux paradigmes habituellement opposés (à de rares exceptions près, telle que le langage OCaml) et offre au développeur la possibilité de choisir le paradigme le plus approprié à son problème. Il est prévu pour être compilé en bytecode Java (exécutable sur la JVM), ou .Net. Si on souhaite l'utiliser exclusivement avec la JVM, il est alors possible d'utiliser les bibliothèques écrites en Java de façon complètement transparente. Les développeurs habitués à un seul paradigme (par exemple ceux ayant utilisé principalement Java qui, lui, repose sur la programmation orientée objet) peuvent trouver ce langage déroutant et difficile car il nécessite l'apprentissage de concepts différents si on veut pouvoir exploiter tout son potentiel. object HelloWorld extends App { println("Hello, world!")} puis exécuté :

ssl/ssh multiplexer What is it? sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the remote client. Install me! sslh has been packaged for Debian, Gentoo, FreeBSD and many other operating systems, so check out your favourite package repository before installing by hand. You can compile sslh for Cygwin 1.7 (older version will not work), or download the binary version provided below by Arnaud Gendre. Mailing list Announcements of new versions will be posted on the sslh mailing list. Git repository sslh is managed in Git and pushed to Github. Tags are normally all signed off using my public key, which you should also be able to get from your neighbourhood key server. Get it! sslh 1.18 [asc] Added USELIBPCRE to make use of regex engine optional. sslh 1.17 i686 Cygwin binaryx86_64 Cygwin binary Support RFC5952-style IPv6 addresses, e.g. [::]:443. sslh 1.16 Cygwin binary [Includes DLLs necessary to run without a full install of Cygwin] sslh 1.9

Beginner’s Guide to OAuth – Part III : Security Architecture As an authorization delegation protocol, OAuth must be secure and allow the Service Provider to trust the Consumer and validate the credential provided to gain access. To accomplish that, OAuth defines a method for validating the authenticity of HTTP requests. This method is called Signing Requests and in order to understand it, we must first explore the security features and architecture of the protocol, which will be the focus of this part of the Beginner’s Guide. In the following part we will explore how all this comes together and translates into the OAuth signature workflow using interactive examples. The examples in this post cannot be viewed in a feed reader. Disclaimer: This tutorial is not a comprehensive, complete, or accurate security guide. Beyond Basic HTTP defines an authorization method called ‘Basic’ which is commonly used by many sites and APIs. The OAuth signature method was primarily designed for insecure communications — mainly non-HTTPS. Direct & Delegated Access

jQuery Image Galleries & Sliders – Best Of jQuery image galleries and sliders are very common on portfolio sites and are also useful for any other type of site for displaying images and photos. Also, provide a good user experience and make viewing images more pleasant and intuitive on your website. With the advent of powerful JavaScript frameworks like jQuery, Prototype, Mootools etc., the quality of JavaScript based image galleries and slideshows have improved dramatically. Today we’ve prepared for you a good list of the best jQuery image sliders and galleries plugins that can provide you with the resources that you need to get a gallery or a slider on your site. Recommended Reading: Top 10 Free Responsive Image Galleries/Slideshows TN3 Gallery Demo | DownloadTN3 Gallery is a full fledged HTML based customizable image gallery with jQuery slideshow, transition, CSS skinning and multiple album options. Supersized Demo | DownloadSupersized is a fullscreen slidehow jQuery plugin. Galleria CU3ER Image Slider jQuery lightBox Gallerific Cycle

Trouver le propriétaire d'une adresse email Vous avez reçu un e-mail d’une personne avec qui vous n’avez jamais interagi, avant de commencer la conversation, vous souhaitez faire un peu de recherche a propos cette personne sur Internet. Comment faites-vous cela sans demander à d’autres personnes? Google est l’endroit le plus pratique pour effectuer des recherches inversées mais si la personne que vous essayez de trouver n’a pas de site Web ou s’ils n’a jamais utilisé cette adresse sur les forums publics, cela rend la tâche plus difficile. Voici quelques façons qui peuvent vous aider à découvrir l’identité de l’expéditeur d’un email. Trouver l’emplacement de l’expéditeur Ouvrez l’en-tête du message électronique et recherchez les lignes « Received: from »suivies par une adresse IP entre crochets. Maintenant coller l’adresse IP dans cette outil et vous devriez obtenir une assez bonne idée approximative de l’emplacement de l’expéditeur du message. Recherche d’email inversée avec Facebook Vérifiez tous les autres réseaux sociaux

Jepp - Java Embedded Python Screencast: Django Command Extensions | Surfing in Kansas This is a screencast on the Django Command Extensions project. It is one of my favorite third party apps, and it gets installed in every Django environment I work in. It provides a plethora of useful commands, and a couple other little goodies as well. Setup Before you get started using these things, there are a couple of packages you need to install. apt-get install graphviz easy_install Werkzeug Writeup The website for the django extensions has a pretty good list of all of the commands that are available. As a note, for things that output something to the screen, you can redirect that output to a file really easily. The command for graphviz is / graph_models auth blog |dot -Tpng -o test.png The output of graphviz is awesome. Thanks for watching, and stay tuned for more screencasts (and other content too ;))

Burp Burp Proxy is an intercepting proxy server for security testing of web applications. It operates as a man-in-the-middle between your browser and the target application, allowing you to: Intercept and modify all HTTP/S traffic passing in both directions.Easily analyze all kinds of content, with automatic colorizing of request and response syntax, rendering of web content, and parsing of serialization schemes like AMF.Apply fine-grained rules to determine which requests and responses are intercepted for manual testing.View all traffic in the detailed Proxy history, with advanced filters and search functions.Send interesting items to other Burp Suite tools with a single click.Save all of your work, and resume working later.Quickly search and highlight interesting content within HTTP messages.Work with custom SSL certificates and non-proxy-aware clients.Define rules to automatically modify requests and responses without manual intervention. Screenshots - click to enlarge Selected Tools

Related:  software tools