TCP tunnel with Vernam Encryption
☆27Mar 7, 2015Updated 11 years ago
Alternatives and similar repositories for VernamTunnel
Users that are interested in VernamTunnel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A lightweight tunnel proxy, just a toy☆10Apr 6, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- a list of ip route for gfw-blocked websites☆11Jun 8, 2011Updated 14 years ago
- Minimal HTTP server written in C for Linux, Android, Windows, Mac OSX, *BSD☆12Feb 13, 2018Updated 8 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Jan 6, 2015Updated 11 years ago
- Authenticating HTTP(S) proxy with TCP/IP tunneling and acceleration—mirror of http://svn.awk.cz/cntlm☆15Jan 21, 2013Updated 13 years ago
- A cross-platform game library in the public domain☆15Aug 12, 2019Updated 6 years ago
- html parser in lua☆12Jan 28, 2026Updated last month
- Ad free DNS server. A docker container with a DNS server configured to block advertisement hosts.☆28Sep 30, 2020Updated 5 years ago
- Stolen WiFi Aggregate Tunneling Protocol Dæmon (RAID your internet connections!)☆18Jun 16, 2012Updated 13 years ago
- Chinese firewall blocked url tester☆17Oct 10, 2013Updated 12 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- A remote access trojan over DNS☆98Dec 23, 2015Updated 10 years ago
- OpenELEC-AntiPrism - The living room secure PC for everyone☆14Jan 28, 2017Updated 9 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- kdf password strengthener☆10Dec 26, 2019Updated 6 years ago
- BSD compatibility library (mirror)☆15Jul 26, 2025Updated 7 months ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Original Apollo 11 guidance computer (AGC) source code digitized by folks at Virtual AGC (http://www.ibiblio.org/apollo/) and MIT Museum.☆13Aug 15, 2016Updated 9 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- PHP翻墙工具下载工具,VPN,下载工具,FQ,翻墙下载,php☆15Apr 29, 2015Updated 10 years ago
- Configurations for tinc on routers, for bypassing GFW in China. Can be used to replace OpenVPN solutions.☆17Oct 20, 2014Updated 11 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- 局域网通讯的软件,支持文字、语音聊天、文件、文件夹传送功能。☆13Aug 22, 2019Updated 6 years ago
- A gevent based socks5 tunnel server.☆17Jul 10, 2012Updated 13 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Aug 26, 2015Updated 10 years ago
- A BSD-style base system using linux kernel☆14Jun 23, 2015Updated 10 years ago
- Customizable network traffic tunneling tool☆36Apr 3, 2016Updated 9 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Code to disrupt the Tox network for hardening/testing purposes.☆37Sep 12, 2014Updated 11 years ago
- TCMPortMapper is an Obj-C/Cocoa NAT-Traversal framework that maps ports via UPNP and NAT-PMP.☆29Aug 12, 2017Updated 8 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- 一键翻墙看世界,安全又方便!☆16Aug 17, 2015Updated 10 years ago
- A public domain H.261 en- and decoder developed by the Portable Video Research Group at Stanford, patched to build on modern systems☆25May 8, 2014Updated 11 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago