seiferteric / qrtunLinks
IP Over QR Code Tunnel
☆199Updated 8 years ago
Alternatives and similar repositories for qrtun
Users that are interested in qrtun are comparing it to the libraries listed below
Sorting:
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Open Database of Firmware Test Results☆150Updated 9 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆251Updated 10 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- A program to send Ethernet PAUSE frames☆36Updated 8 years ago
- A Go TLS/HTTPS server demo that uses a Yubikey as the backend for it's private key☆182Updated 7 years ago
- SIP answering machine running on Raspberry Pi☆208Updated 3 years ago
- Example of Linux SO_REUSEPORT☆91Updated 7 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- aims to distribute the DNS service on many nodes so it can neither be taken down nor be manipulated☆250Updated 10 years ago
- ☆89Updated 9 years ago
- chkboot is a tool to help detect changes to an unencrypted /boot partition.☆146Updated 4 years ago
- Programmable Dropbox for secure IoT☆70Updated 8 years ago
- ☆144Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- $2 hardware SSH keys storage☆156Updated 4 years ago
- If you get pw3ned, might want to fix your shell☆197Updated 8 years ago
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,286Updated 6 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 9 years ago
- CJAG is an open-source implementation of our cache-based jamming agreement.☆283Updated 3 years ago
- WiFi Tracker Confuser☆65Updated 7 years ago
- The "Intel x86 considered harmful" paper☆197Updated 9 years ago
- ☆70Updated 8 years ago
- A list of publicly known but unfixed security bugs☆237Updated 7 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Dead simple LAN file transfers from the command line☆403Updated 3 years ago
- ☆97Updated 7 years ago
- Code to drive the receipt printer in the Cloudflare London office that outputs randomness☆95Updated 8 months ago