Ycarus Gentoo ebuild

spike

These ebuilds come from .

If you have some problems, go to the official site first.

net-proxy

3proxy : 3Proxy is really tiny cross-platform proxy servers set ( http://www.3proxy.ru/ )

burpsuite : an interactive HTTP/S proxy server for attacking and debugging web-enabled applications ( http://portswigger.net/suite/ )

mallory : An TCP/UDP transparent proxy that can be used to intercept network streams ( https://intrepidusgroup.com/insight/mallory/ )

pbounce : Multiplexes multiple TCP connections into internal network via reverse connection ( http://www.o0o.nu/projects/bouncers )

proxenet : A hacker friendly proxy for web application penetration tests. ( https://github.com/hugsy/proxenet )

proxenet-plugins : Repository for proxenet plugins ( https://github.com/hugsy/proxenet )

proxystrike : A tool designed to find vulnerabilities while browsing an application ( http://code.google.com/p/proxystrike/ )

pwnat : allows clients behind NATs to communicate with a server behind a separate NAT to communicate with each other ( http://samy.pl/pwnat/ )

redsocks : Transparent redirector of any TCP connection to proxy ( http://darkk.net.ru/redsocks/ )

sshttp : an easy to use OSI-Layer5 switching daemon ( http://c-skills.blogspot.com/ )

sslsplit : Transparent and scalable SSL/TLS interception ( http://www.roe.ch/SSLsplit )

webscarab : A framework for analysing applications that communicate using the HTTP and HTTPS protocols ( http://www.owasp.org/software/webscarab.html )

zaproxy : An easy to use integrated penetration testing tool for finding vulnerabilities in web applications ( http://code.google.com/p/zaproxy/ )

Add an ebuild in portage :

The ebuild is now in the portage tree.

You can also use layman : emerge layman then layman -a spike

For Paludis use this rsync : rsync://gentoo.zugaina.org/spike-portage

If you have a problem : ycarus(-at-)zugaina.org