arvidn / torrent-toolsLinks
tools for creating, inspecting and modifying torrent files
☆13Updated 3 years ago
Alternatives and similar repositories for torrent-tools
Users that are interested in torrent-tools are comparing it to the libraries listed below
Sorting:
- Sign JSON objects with ED25519 signatures☆12Updated 3 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- tamper resistant audit log☆17Updated 7 years ago
- Portable (static / old glibc linked) Linux binaries for red-team / blue-team☆18Updated last year
- IMEI generator used in Huawei modified firmware☆12Updated 3 years ago
- ☆18Updated 2 years ago
- eBPF Sockmap Proxy☆16Updated 3 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Updated last year
- Debugger checks in 3 ways☆19Updated 8 years ago
- Historical Tracking of MAC Address Assignments☆40Updated this week
- ld_preload userland rootkit☆35Updated 5 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated last year
- Demonstrate the behavior of the tunnel cache on Windows☆10Updated 6 years ago
- Phorklift is an HTTP server and proxy daemon, with clear, powerful and dynamic configuration.☆45Updated 4 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated last year
- C++ implementation of ssdeep-compatible fast fuzzy hashing☆37Updated 8 years ago
- Architecture - design and implementation of the D4 project architecture☆16Updated 6 months ago
- Diameter TCP to SCTP proxy☆13Updated 13 years ago
- Library and tools to access the GUID Partition Table (GPT) volume system format☆11Updated last month
- A list of backdoor samples I find online.☆13Updated 6 years ago
- A fast Web API scraper written in C++ and built on Boost ASIO☆43Updated 5 years ago
- 🖼 imgify - Convert any file to PNG and back.☆13Updated 3 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Library and tools to access the Extended File System☆18Updated last month
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Updated 6 years ago
- A network forensics and passive sniffer tool☆50Updated 2 weeks ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Cross platform filtering HTTP/S proxy based on .NET Standard 2.0.☆44Updated 4 years ago
- Data orchestration and management.☆10Updated 5 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago