reklatsmasters / dnscryptLinks
dnscrypt - authenticated and encrypted dns client for nodejs
☆14Updated 5 years ago
Alternatives and similar repositories for dnscrypt
Users that are interested in dnscrypt are comparing it to the libraries listed below
Sorting:
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- transparent TCP-to-proxy redirector☆16Updated 6 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Backup scripts I use on my drives.☆25Updated 8 years ago
- Chef repository for pentesting tools☆13Updated 8 years ago
- A Passive DNS backend and collector☆32Updated 3 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Updated 14 years ago
- apbleed☆24Updated 11 years ago
- Network white noise collector☆19Updated 9 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 5 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Updated 8 years ago
- Checklists☆16Updated 9 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- Truehunter☆30Updated 4 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 2 years ago
- Simplified NAT Slipstream server and client☆22Updated 5 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- ld_preload userland rootkit☆35Updated 5 years ago
- Minimalistic DNS logging tool☆43Updated 3 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- Multi-head SSH honeypot system.☆23Updated last year
- w3af packaging for Kali distribution☆26Updated 10 years ago
- Explore the Tor network☆89Updated 2 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago