pirate / mesh-networking
LEGO blocks for networking, a Python library to help create and test flexible network topologies across real and simulated physical links.
☆360Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for mesh-networking
- IP Over QR Code Tunnel☆196Updated 7 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 3 years ago
- All your IPs are belong to us.☆667Updated 6 years ago
- aims to distribute the DNS service on many nodes so it can neither be taken down nor be manipulated☆248Updated 10 years ago
- Securely locate peers without central servers☆151Updated 7 years ago
- A Linux packet crafting tool.☆463Updated 4 years ago
- Provably Anonymous Overlay☆322Updated 10 years ago
- Educational SSH client☆123Updated 8 years ago
- The Hyperboria peering device☆140Updated 8 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆153Updated 8 years ago
- serverless, encrypted, NAT-breaking p2p connections - DEPRECATED☆267Updated 4 years ago
- Sandboxed Execution Environment☆813Updated 4 years ago
- Full network stack over sound -- lwIP driver for libquiet☆662Updated 4 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆454Updated last year
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆922Updated 2 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆272Updated 4 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆413Updated 7 years ago
- Pond☆912Updated 2 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 7 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆372Updated 2 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 8 years ago
- How to backdoor Diffie-Hellman☆609Updated 8 years ago
- given an ip address, return which cloud provider it belongs to (AWS, GCE, etc)☆142Updated 6 years ago
- SC4 - Strong Crypto for Mere Mortals☆120Updated 3 years ago
- SIP answering machine running on Raspberry Pi☆208Updated 2 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 7 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆399Updated 3 years ago
- a source code for DNS over HTTP implementation☆165Updated 5 years ago