Node.js DTLS Proxy, library and tools to connect plain-text UDP clients with plain-text UDP servers over an encrypted UDP tunnel..
☆14Dec 2, 2018Updated 7 years ago
Alternatives and similar repositories for node-dtls-proxy
Users that are interested in node-dtls-proxy are comparing it to the libraries listed below
Sorting:
- My Collection of x64 Assembly programs with NASM☆20Oct 21, 2018Updated 7 years ago
- Automatic create jira issues using CSV files☆13Nov 10, 2018Updated 7 years ago
- Voice command assistant☆38Nov 16, 2016Updated 9 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Oct 23, 2019Updated 6 years ago
- bingo online do roger☆25Jul 22, 2022Updated 3 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆23Apr 27, 2025Updated 10 months ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- Auto Updater Joomla Components and Exploits Scanner☆27Apr 1, 2018Updated 7 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Sep 2, 2019Updated 6 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- Open Source Intelligence - Buscando informações sobre infraestruturas☆10Feb 13, 2019Updated 7 years ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- It's only hitting vulnerable path in termdd.sys!!! NOT DOS☆12May 19, 2019Updated 6 years ago
- !!! Use https://gitlab.com/tslocum/adbfm instead !!! Android ADB file manager☆27Sep 8, 2014Updated 11 years ago
- UniFi 5 Controller for Raspberry Pi☆13Jan 31, 2018Updated 8 years ago
- Python 2.7 binding for liblxc (similar to the better supported python3-lxc)☆50Feb 14, 2018Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆54Nov 27, 2019Updated 6 years ago
- Allows external systems or MCUs to connect BLE (CC2540) using HCI as BLE Central Role☆11Jul 1, 2015Updated 10 years ago
- Download musique from mixcloud☆11Aug 12, 2018Updated 7 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- A JavaScript API for the UniFi Controller built with Loopback☆12Oct 17, 2018Updated 7 years ago
- Instructions and code for making an e-Ink Google Calendar for Raspberry Pi☆12May 13, 2020Updated 5 years ago
- Honeypot FTP server written in .NET Core (C#) for both Linux and Windows.☆14Dec 8, 2022Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Aug 18, 2021Updated 4 years ago
- shARP_2.0 is an updated version for shARP with more options for better performance.☆12Oct 12, 2017Updated 8 years ago