quiet / quiet-lwip
Full network stack over sound -- lwIP driver for libquiet
☆663Updated 5 years ago
Alternatives and similar repositories for quiet-lwip:
Users that are interested in quiet-lwip are comparing it to the libraries listed below
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- ☆781Updated 7 years ago
- All your IPs are belong to us.☆670Updated 6 years ago
- Transmit data with sound. Includes binaries for soundcards and .wav files.☆1,620Updated 3 years ago
- Protocol detecting server☆574Updated 4 years ago
- Monitor the output of terminals and processes.☆1,014Updated 9 years ago
- An experiment to authenticate web sessions with SSH - http://demo-ssh.32b6.com☆726Updated 9 years ago
- View space usage in your terminal.☆595Updated 6 years ago
- Population based metaheuristic for password cracking. Siga(Simple genetic algorithm)☆413Updated 7 years ago
- Micro C library for handling HTTP requests on low resource systems.☆662Updated 4 years ago
- Quiet for Android - TCP over sound☆1,428Updated 3 years ago
- Decentralized feeds using BitTorrent's DHT. Idea from Arvid and The_8472 "DHT RSS feeds" http://libtorrent.org/dht_rss.html☆874Updated 9 years ago
- URL Shortener built on top of WAFer☆183Updated 8 years ago
- Tunnel TCP through WebSockets.☆711Updated last year
- A minimal C runtime for Linux i386 & x86_64☆585Updated 3 years ago
- IP Over QR Code Tunnel☆199Updated 8 years ago
- Tool for launching a Linux process from a snapshot☆449Updated 9 years ago
- A microframework for C based on GLib.☆727Updated 2 months ago
- Simulate reverse causality using quantum suicide.☆366Updated 8 years ago
- Inline C/asm in Bash☆252Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- Transform your PC into a Raspberry Pi☆152Updated 10 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆402Updated 4 years ago
- Tunneling Internet traffic over Facebook chat.☆1,291Updated 8 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- serverless, encrypted, NAT-breaking p2p connections - DEPRECATED☆265Updated 4 years ago
- Comp Mark II – Simple 4-bit virtual computer☆169Updated last year
- Example of CPU simulation in software☆158Updated 9 years ago
- Comp Mark I – Simple 4-bit virtual computer☆344Updated last year
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆930Updated 2 years ago