Tunna | TCP communication over HTTP | Proxy library

 by   SECFORCE Python Version: Current License: No License

kandi X-RAY | Tunna Summary

kandi X-RAY | Tunna Summary

Tunna is a Python library typically used in Networking, Proxy applications. Tunna has no bugs, it has no vulnerabilities and it has medium support. However Tunna build file is not available. You can download it from GitHub.

In a fully firewalled (inbound and outbound connections restricted - except the webserver port). The webshell can be used to connect to any service on the remote host. This would be a local connection on a local port at the remote host and should be allowed by the firewall. The webshell will read data from the service port wrap them over HTTP and send it as an HTTP response to the local proxy. The local proxy will unwrap and write the data to it’s local port where the client program would be connected. When the local proxy receives data on the local port, it will send them over to the webshell as an HTTP Post. The webshell will read the data from the HTTP Post and put them on the service port. Only the webserver port needs to be open (typically 80/443) The whole communication (Externally) is done over the HTTP protocol.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              Tunna has a medium active ecosystem.
              It has 1158 star(s) with 297 fork(s). There are 61 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              There are 14 open issues and 3 have been closed. On average issues are closed in 114 days. There are 1 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of Tunna is current.

            kandi-Quality Quality

              Tunna has 0 bugs and 0 code smells.

            kandi-Security Security

              Tunna has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              Tunna code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              Tunna does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              Tunna releases are not available. You will need to build from source code and install.
              Tunna has no build file. You will be need to create the build yourself to build the component from source.
              Installation instructions are not available. Examples and code snippets are available.
              Tunna saves you 816 person hours of effort in developing the same functionality from scratch.
              It has 2083 lines of code, 67 functions and 11 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi has reviewed Tunna and discovered the below as its top functions. This is intended to give you an instant insight into Tunna implemented functionality, and help decide if they suit your requirements.
            • Start webserver
            • Run proxy .
            • Starts the connection .
            • Establish a connection
            • Initialize the server .
            • The Ping thread
            • Clean up sessions .
            • Receive data from socket .
            • Connect to Tunna .
            • Print banner .
            Get all kandi verified functions for this library.

            Tunna Key Features

            No Key Features are available at this moment for Tunna.

            Tunna Examples and Code Snippets

            No Code Snippets are available at this moment for Tunna.

            Community Discussions

            QUESTION

            elementFromPoint not recognising certain elements
            Asked 2022-Jan-27 at 02:33

            I have an issue with which I've been battling for a couple of days now and I cannot understand what the problem is.

            I want to fire up an event when a certain element hits the top of my

            . It works well with most of the elements in my document except one, which incidentally is the one I'm interested in.

            They're all span, with different classes. I'm detecting the class with el.classList.contains("myclass"). See my snippet below, with pagenum in the function, which gets picked up (although several times, but that's another minor issue). It works with line, line-group, and pagenum. It doesn't work with mspage.

            Can someone tell me please what I am missing?

            Thanks.

            Update

            I just noticed that if I give the mspage elements a height of 2 rem then it does detect them. Ideally I wanted those spans to be invisible to the user, and if I use display:none or visibility:hidden they don't get caught.

            ...

            ANSWER

            Answered 2022-Jan-27 at 02:33

            Using elementFromPoint is not a good approach. Your interested element will not be detected if it doesn't happen to stay under that point. Even worse, the chances for a zero height element to be detected is zero. You should compare the offsetTop of your interested element with the scrollTop + offsetTop of the scrolling element. The find can be further optimised with binary search if necessary.

            Source https://stackoverflow.com/questions/70872323

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install Tunna

            You can download it from GitHub.
            You can use Tunna like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.

            Support

            Sockets not enabled by default: php windows (IIS + PHP) XAMPP Windows php linux (PHP bultin web server/apache + PHP) If you have the error Uncaught Error: Call to undefined function socket_create() see https://stackoverflow.com/questions/6137823/fatal-error-call-to-undefined-function-socket-create. Return cariages on webshells (outside the code): get sent on responses / get written on local socket -→ corrupt the packets. PHP webshell for windows: the loop function DoS’es the remote socket: sleep function added → works but a bit slow. PHP webshell needs new line characters removed at the end of the file (after "?>") as these will get send in every response and confuse Tunna.
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/SECFORCE/Tunna.git

          • CLI

            gh repo clone SECFORCE/Tunna

          • sshUrl

            git@github.com:SECFORCE/Tunna.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular Proxy Libraries

            frp

            by fatedier

            shadowsocks-windows

            by shadowsocks

            v2ray-core

            by v2ray

            caddy

            by caddyserver

            XX-Net

            by XX-net

            Try Top Libraries by SECFORCE

            sparta

            by SECFORCEPython

            SNMP-Brute

            by SECFORCEPython

            SharpWhispers

            by SECFORCEC#

            sftp-exploit

            by SECFORCEPython

            fixer

            by SECFORCERuby