Programming

Connect to remote website using socks5 proxy

Bogdan Ungureanu
Honeypots are a security tool that is used to protect networks and systems from malicious attacks. They are designed to mimic the behavior of a real network or system, making them appear attractive to potential attackers. When an attacker targets a honeypot, they are led to believe that they have successfully breached a valuable asset, when in reality, they are interacting with a decoy. Honeypots are a valuable tool for security professionals, as they can provide valuable information about an attacker’s tactics and motivations, as well as alerting the security team to potential threats.

HTTP request tracing middleware

Bogdan Ungureanu

Request-based tracing provides a way to determine what exactly is happening with your requests and why.

It is handy when you want to reproduce and understand the problem that you are experiencing.

IP Based rate-limit middleware using go.uber.org/ratelimit

Bogdan Ungureanu

If you’re running a HTTP server and want to rate limit user requests, and most of the frameworks are providing their own middleware.

But if you want something simple and lightweight – or just want to learn – it’s not too difficult to roll your own middleware to handle rate limiting.