pirate / mesh-networking
LEGO blocks for networking, a Python library to help create and test flexible network topologies across real and simulated physical links.
☆359Updated 5 years ago
Alternatives and similar repositories for mesh-networking:
Users that are interested in mesh-networking are comparing it to the libraries listed below
- All your IPs are belong to us.☆669Updated 6 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 3 years ago
- A Linux packet crafting tool.☆464Updated 4 years ago
- serverless, encrypted, NAT-breaking p2p connections - DEPRECATED☆267Updated 4 years ago
- PGP-like encryption + torrent-like addressing + blockchain-like enforcement of data expiry☆123Updated 7 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- Securely locate peers without central servers☆151Updated 7 years ago
- Quantum Insert☆212Updated 6 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Run a script when one or more sensors fail.☆873Updated 8 years ago
- OnionBalance provides load-balancing and redundancy for Tor hidden services☆272Updated 4 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆931Updated 9 years ago
- aims to distribute the DNS service on many nodes so it can neither be taken down nor be manipulated☆248Updated 10 years ago
- The Babel routing daemon☆390Updated 2 months ago
- Monitor the output of terminals and processes.☆1,013Updated 9 years ago
- IP Over QR Code Tunnel☆198Updated 8 years ago
- ☆782Updated 6 years ago
- Decentralized feeds using BitTorrent's DHT. Idea from Arvid and The_8472 "DHT RSS feeds" http://libtorrent.org/dht_rss.html☆878Updated 8 years ago
- Full network stack over sound -- lwIP driver for libquiet☆662Updated 5 years ago
- Sniffing browser history using HSTS☆935Updated 7 years ago
- The hacker's way of keeping up with the world (NO LONGER MAINTAINED)☆803Updated 7 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 7 years ago
- Surveillance Detection and Mapping App☆235Updated 6 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆456Updated last year
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆578Updated 7 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆414Updated 7 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆372Updated 3 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- opmsg message encryption☆753Updated last year
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆143Updated 3 years ago