benjojo / dnsfsLinks
Store your data in others DNS resolver cache
☆1,087Updated 6 years ago
Alternatives and similar repositories for dnsfs
Users that are interested in dnsfs are comparing it to the libraries listed below
Sorting:
- Play battleships using BGP☆437Updated 7 years ago
- Map your traceroutes easily.☆307Updated 2 weeks ago
- Redirect `.idk` domains using Wikipedia☆1,531Updated 2 months ago
- unfork(2) is the inverse of fork(2). sort of.☆1,482Updated last year
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- Test ssh login key acceptance without having the private key☆216Updated 4 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆339Updated last year
- A pam module written in C for duress codes in linux authentication☆150Updated 5 years ago
- Stores your data in ICMP ping packets☆3,355Updated 2 years ago
- Silly usage of AWS EC2 IPv6 prefixes☆316Updated 3 years ago
- Progressively image a mounted disk correctly without corruption☆322Updated 3 months ago
- Bootable PDF CV☆228Updated 5 years ago
- A dedicated Chrome instance to log into captive portals without messing with DNS settings.☆467Updated 2 years ago
- Detects which DNS server is being used - https://which.resolve.rs/☆411Updated 3 months ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,301Updated 3 months ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆607Updated last year
- A simple LD_PRELOAD library to disable SSL certificate verification. Inspired by libeatmydata.☆181Updated 7 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,955Updated 2 years ago
- Proof-of-concept for the ZombieLoad attack☆824Updated 4 years ago
- A "living" Linux process with no memory☆351Updated 5 years ago
- << Silk Guardian >> is an anti-forensic kill-switch that waits for a change on your usb ports and then wipes your ram, deletes precious …☆716Updated last year
- Certificate Transparency Log Monitor☆1,115Updated 3 weeks ago
- libeatmydata - because fsync() should be a no-op☆471Updated last year
- Imagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...☆419Updated 4 years ago
- ☆232Updated 2 years ago
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆684Updated 7 years ago
- iptables target that uwu's outgoing packets☆88Updated 4 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆770Updated last year
- One-end encryption, stronger than end-to-end☆221Updated 2 years ago
- List of resources related to LD_PRELOAD, a mechanism for changing application behavior at run-time☆907Updated last year