opmsg p2p transport network
☆75Jul 12, 2018Updated 7 years ago
Alternatives and similar repositories for drops
Users that are interested in drops are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- opmsg message encryption☆756Mar 2, 2023Updated 3 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Jul 13, 2018Updated 7 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆15Nov 12, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Delicious Onion Service Wraps.☆22May 7, 2015Updated 10 years ago
- Server for Noauth Nostr key manager.☆15Jan 8, 2025Updated last year
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- SMTP DANE testing tool☆24Mar 2, 2026Updated last month
- SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.☆896Jun 22, 2023Updated 2 years ago
- trustlessly trade ethereum for other cryptocurrencies.☆15Mar 11, 2015Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Sep 22, 2018Updated 7 years ago
- post-quantum email encryption with CodeCrypt☆11Feb 23, 2018Updated 8 years ago
- The decentralized, completely anonymous, lightweight, peer-to-peer network communication protocol.☆26Jul 21, 2019Updated 6 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- A tool to create human-writable versions of your PGP paperkey backup.☆10Jul 4, 2022Updated 3 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆18Jul 13, 2020Updated 5 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆232Apr 4, 2025Updated last year
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Aug 4, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- PriFi, a low-latency, local-area anonymous communication network.☆52Jan 9, 2024Updated 2 years ago
- Tor traffic whitelisting gateway☆77May 1, 2025Updated 11 months ago
- ☆12Oct 27, 2017Updated 8 years ago
- Picon☆39Apr 16, 2017Updated 8 years ago
- Organization site☆11Sep 27, 2019Updated 6 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Cython bindings for libpcap and libtins☆10Dec 19, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Jericho Chat - Information-theoretically secure communications☆22Mar 15, 2026Updated 3 weeks ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Jul 31, 2015Updated 10 years ago
- A public database for software and firmware hashes☆215Nov 12, 2016Updated 9 years ago
- documentation and writing☆42Jul 11, 2018Updated 7 years ago