cloudflared-docker
routersploit
cloudflared-docker | routersploit | |
---|---|---|
1 | 11 | |
150 | 11,906 | |
- | 0.7% | |
7.4 | 6.5 | |
22 days ago | about 1 month ago | |
Dockerfile | Python | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cloudflared-docker
-
Exposing a web service with Cloudflare Tunnel
Hi, I'm the author of the blog post being promoted here.
I maintain my own Docker image too for personal use (https://github.com/Erisa/cloudflared-docker) but I've never ran into a situation where needing everything as an environment variable was required or even desired.
routersploit
- I forgot my Router's password and I can just press Reset Button on router.. but is there any fun way to change the password? I know the Wifi's Username/Pass and Router's admin name.
- Is there a way to gain a router's webpage password and username?
-
What would you like to see in a college-level cyber security course?
routersploit
-
My neighbor is causing trouble in the neighborhood
Also check the routersploit, they have some scanners, to check for vulnerabilities. https://github.com/threat9/routersploit
- DrayTek Bruteforce
-
Exposing a web service with Cloudflare Tunnel
Lmao your response made me chuckle. You're entirely right! Probably nothing bad will happen. Especially if you partition your network like I mentioned in my OP.
I would get worried about somehow enabling access to defects in my router by opening some inbound ports. I realize that's a little paranoid...but recently I have been playing around with https://github.com/threat9/routersploit and routinely find defects in consumer routers.
Here's my other beef with cloudflare: Once I gotta pay 200+/mo for their security services or whatever, I could just rent out a private rack in a colocation and throw some old beefy lga-2011 xeon hosts. Now I don't need anything on my LAN exposed and I have dedicated IPs, physical security, and backup generators...etc.
- Router login page credentials
-
How to gain root access to my Modem/Router
Run https://github.com/threat9/routersploit against it
-
Router login crack without password list
try routersploit out for exploits thag don’t have to do with wordlists and stuff, rly good tool
-
Testing my pfSense box & Network using RouterSploit and Nmap
You can look at the check yourself: https://github.com/threat9/routersploit/blob/master/routersploit/modules/exploits/routers/linksys/eseries_themoon_rce.py
What are some alternatives?
awesome-tunneling - List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
honeycomb - An extensible honeypot framework