inlets-pro
routersploit
Our great sponsors
inlets-pro | routersploit | |
---|---|---|
23 | 11 | |
517 | 11,857 | |
0.2% | 0.7% | |
5.1 | 5.4 | |
13 days ago | 3 days ago | |
Mustache | Python | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
inlets-pro
-
inlets-pro VS chisel-operator - a user suggested alternative
2 projects | 4 Jul 2023
-
Chisel Operator - A Kubernetes operator and external load balancer/reverse proxy implementation for the Chisel tunnel server 🚀
I created this because of my frustration with inlets.
-
TSOCKET: Completely Free HTTP and TCP Tunneling tool. create multiple http tunnels and get public urls
How does this compare with ngrok, localtunnel, or Inlets?
-
Exposing a web service with Cloudflare Tunnel
It's unfortunate the only mature open source alternative[1] went on a path to seriously expensive subscriptions, 5x of a tailscale personal subscription.
[1]: https://inlets.dev/
- Minikube: How to connect to the control-plane IP as the range is outside LAN range?
- Ask HN: Those making $500/month on side projects in 2021 – Show and tell
- Accessing Kubernetes DNS locally without kubectl
routersploit
-
Exposing a web service with Cloudflare Tunnel
Lmao your response made me chuckle. You're entirely right! Probably nothing bad will happen. Especially if you partition your network like I mentioned in my OP.
I would get worried about somehow enabling access to defects in my router by opening some inbound ports. I realize that's a little paranoid...but recently I have been playing around with https://github.com/threat9/routersploit and routinely find defects in consumer routers.
Here's my other beef with cloudflare: Once I gotta pay 200+/mo for their security services or whatever, I could just rent out a private rack in a colocation and throw some old beefy lga-2011 xeon hosts. Now I don't need anything on my LAN exposed and I have dedicated IPs, physical security, and backup generators...etc.
What are some alternatives?
honeycomb - An extensible honeypot framework
RomBuster - RomBuster is a router exploitation tool that allows to disclosure network router admin password.
kilo - Kilo is a multi-cloud network overlay built on WireGuard and designed for Kubernetes (k8s + wg = kg)
houndsploit - An advanced graphical search engine for Exploit-DB
dora - Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Wordlist-Generator - A python tool capable of creating HUGE wordlists. Has the ability to add custom words for concatenation in any way you see fit.
gst-raspberry - Scripts dedicated to providing low-latency LAN video streaming from a Raspberry Pi to a Linux Machine
TheSmartool - An easy to handle hacking script, SSH Forcebrute, FTP Forcebrute and many others features
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
docker-cloudflared
cloudflared-docker - Simple Alpine-built scratch-runtime Dockerfile for cloudflared, with support for multiple architectures.
jenkins-infra - Jenkins-CI for FluxCD maintainer Kingdon (GitHub: kingdon-ci)