seiferteric / qrtun
IP Over QR Code Tunnel
☆196Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for qrtun
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 3 years ago
- ☆142Updated 8 years ago
- Open Database of Firmware Test Results☆150Updated 8 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- Full network stack over sound -- lwIP driver for libquiet☆662Updated 5 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆299Updated 3 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Trace And Rewrite Delays In Syscalls: Hooking time-related Linux syscalls to warp a process's perspective of time, using ptrace.☆158Updated 7 months ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆143Updated 3 years ago
- Educational SSH client☆123Updated 8 years ago
- A program to send Ethernet PAUSE frames☆34Updated 8 years ago
- Example of Linux SO_REUSEPORT☆91Updated 7 years ago
- $2 hardware SSH keys storage☆156Updated 3 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆252Updated 9 years ago
- ☆88Updated 8 years ago
- Removes all "Social DRM" from booXtream ePub files☆180Updated 6 years ago
- A list of publicly known but unfixed security bugs☆238Updated 6 years ago
- A Linux shell script to improve your privacy online☆83Updated 8 years ago
- If you get pw3ned, might want to fix your shell☆196Updated 7 years ago
- aims to distribute the DNS service on many nodes so it can neither be taken down nor be manipulated☆248Updated 10 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- SIP answering machine running on Raspberry Pi☆208Updated 2 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time | poc or gtfo☆395Updated 9 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆280Updated 2 years ago
- Machine learning algorithm to connect anonymous accounts to real names☆95Updated 8 years ago
- Transform your PC into a Raspberry Pi☆152Updated 9 years ago
- A filesystem sandbox for Linux using syscall intercepts.☆398Updated 3 years ago