Hidden VPN protocol to avoid large scale blocking of TLS-based censorship circumvention
☆84Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for Terminator-Samurai-VPN
Users that are interested in Terminator-Samurai-VPN are comparing it to the libraries listed below
Sorting:
- It automatically picks OTP from sms. I implemented this without using any Flutter plugin.☆14Nov 15, 2022Updated 3 years ago
- 3D browser voxel editor with a ray tracer capabilities implemented. Entirely made with pure Javascript and THREEJS.☆17Jul 16, 2019Updated 6 years ago
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- UDP packet obfuscation with eBPF, which tunnels UDP over pseudo-TCP☆10Jun 5, 2023Updated 2 years ago
- Protobuf interface and stubs for Bee Agent Framework.☆10Mar 18, 2025Updated 11 months ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- ☆11Oct 30, 2024Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- An experimental open-source attempt to make GPT-4 fully autonomous.☆18Oct 25, 2023Updated 2 years ago
- ☆12Nov 8, 2024Updated last year
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- ☆11Jul 4, 2022Updated 3 years ago
- Python and Fortran Numerical Implementations of the Polya Enumeration Theorem☆12Nov 9, 2016Updated 9 years ago
- Everything related to YARA☆16Feb 19, 2026Updated 2 weeks ago
- An app highlighting how you can use the Highlight API☆15Dec 15, 2024Updated last year
- 🐳 Docker Image Packaging for BIRD☆11Aug 7, 2025Updated 7 months ago
- The RedHerring plugin is an extension for the CTFd platform that introduces a new type of challenge. It aims to promote fairness and prev…☆13Sep 6, 2023Updated 2 years ago
- ☆15Aug 3, 2023Updated 2 years ago
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.☆21Nov 13, 2022Updated 3 years ago
- ☆15Nov 9, 2024Updated last year
- ☆17Jan 22, 2026Updated last month
- tiny-singlefile-encrypted-udp-tunnel☆15Jul 5, 2017Updated 8 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- ☆16Apr 7, 2023Updated 2 years ago
- This is the flight control source code of breeze mini quadcopter, and the suffix none means no real-time operating system used.☆13Dec 17, 2017Updated 8 years ago
- Extract API endpoints in APK☆21Aug 31, 2023Updated 2 years ago
- An extended starter skeleton for new Bolt Extensions☆15Aug 23, 2017Updated 8 years ago
- 🗂 Knowledge Base on the Security of Chromium Extensions (https://extensions.neplox.security)☆19Jan 24, 2025Updated last year
- ☆18Dec 12, 2025Updated 2 months ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 18, 2026Updated 2 weeks ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- PyTorch code for "ADEM-VL: Adaptive and Embedded Fusion for Efficient Vision-Language Tuning"☆21Oct 28, 2024Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Mar 24, 2023Updated 2 years ago
- ☁🔥 Dynamic IP address got you down? Leverage Cloudflare to create an easy to remember hostname and never lose your connection again.☆19Jul 1, 2024Updated last year
- Port Crawler Pythonized☆19Dec 8, 2022Updated 3 years ago
- A kernel module to obtain source IPv4 address in the TCP option section.☆26Mar 22, 2022Updated 3 years ago