NCD scripting language, tun2socks proxifier, P2P VPN
☆20Apr 19, 2014Updated 11 years ago
Alternatives and similar repositories for badvpn
Users that are interested in badvpn are comparing it to the libraries listed below
Sorting:
- tun2socks as a library for iOS apps☆95Aug 31, 2015Updated 10 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆10May 30, 2015Updated 10 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- A small command line application that pulls temps of various hardware components using Open Hardware Monitor Lib, outputs info along with…☆12Feb 14, 2018Updated 8 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- A docker image for ocserv☆11May 26, 2016Updated 9 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- WordPress Optimization Solutions☆10Mar 13, 2019Updated 6 years ago
- ☆12May 1, 2023Updated 2 years ago
- An NPM package to communicate with Swarmapp (foursquare) API☆12Dec 2, 2024Updated last year
- Example project to show usage of Travis-CI for iOS☆16May 1, 2014Updated 11 years ago
- Simple dependency injection container with some state handling functions (for facebook flux-like state-management)☆12Nov 2, 2017Updated 8 years ago
- Get the element at the specified index only if it is within bounds, otherwise nil☆12Jun 5, 2019Updated 6 years ago
- Shadowsocks Encrypt Swift Version☆36Aug 26, 2016Updated 9 years ago
- This is a modification of Florian Kugler's Autolayout Performance tool. The original can be found here: https://github.com/dkduck/AutoLay…☆17May 28, 2013Updated 12 years ago
- Android protobuf rpc implementation over BLE☆11Apr 21, 2016Updated 9 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Ansible role for installing/configuring centminmod on CentOS 7☆13May 24, 2017Updated 8 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 11 years ago
- ☆13Feb 9, 2026Updated 3 weeks ago
- Curated list of public penetration testing reports released by several consulting firms☆12Aug 18, 2016Updated 9 years ago
- multi-user anti-filtering panel, with an effortless installation and supporting more than 20 protocols to circumvent filtering plus the t…☆17Mar 28, 2023Updated 2 years ago
- ☆15Feb 18, 2016Updated 10 years ago
- 用于扫描git,svn泄露☆11Jul 29, 2015Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- SOCKS proxy server and socket client built upon GCDAsyncSocket.☆223Nov 22, 2021Updated 4 years ago
- ☆14Jan 26, 2015Updated 11 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- An Umbrella Framework Example☆14Feb 17, 2018Updated 8 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- AVPlayer (AVFoundation) with .srt subtitle, image and audio extraction☆26May 17, 2013Updated 12 years ago
- ☆12Dec 27, 2015Updated 10 years ago
- ☆13Aug 2, 2020Updated 5 years ago