stealth / qdnsLinks
QUANTUM-DNS server
☆19Updated 6 years ago
Alternatives and similar repositories for qdns
Users that are interested in qdns are comparing it to the libraries listed below
Sorting:
- TCP tunnel with Vernam Encryption☆26Updated 10 years ago
- tox dns server☆44Updated 9 years ago
- I2P bindings for Twisted.☆15Updated 3 years ago
- Host files with DNS☆33Updated 9 years ago
- A tool for securing communications between a client and a DNS resolver☆21Updated 10 years ago
- Dines is the definitive answer to DNS testing☆21Updated 6 years ago
- stream encoding toolkit☆55Updated 9 years ago
- SSTP VPN client for Linux☆18Updated 4 years ago
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 12 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Remote FUSE filesystem via server-side script☆64Updated 10 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- Lazy man's, user-mode union file system☆31Updated 10 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 12 years ago
- Blockfinder enumerates network information for countries☆130Updated 2 years ago
- Command-line utility to control Tor.☆89Updated last year
- ☆12Updated 8 years ago
- LD_PRELOAD hack to redirect connections to other ports☆43Updated 9 years ago
- 3Scan is fast detector for open HTTP/CONNECT/SOCKS4/SOCKS5/FTP/TELNET proxy☆36Updated 5 years ago
- A small suite of scripts and patches for building musl libc cross compilers.☆35Updated 9 years ago
- Gateway between SMTP/POP3 and TOX protocol.☆13Updated 7 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- RESTful interface to your operating system shell☆19Updated 7 years ago
- Mass DNS resolution tool☆37Updated 4 years ago
- Use BIOS ram hacks to make a SSH server out of any INT 10 13h app (MS-DOS is one of those)☆147Updated 9 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- DNS proxy listens for incoming DNS requests on the local interface and resolves the hosts using an external PHP script, through http prox…☆51Updated 2 years ago
- ☆26Updated 13 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago