stealth / qdns
QUANTUM-DNS server
☆18Updated 5 years ago
Alternatives and similar repositories for qdns:
Users that are interested in qdns are comparing it to the libraries listed below
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- Host files with DNS☆32Updated 8 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Updated 6 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- An apt transport method enabling i2p using the SAM bridge.☆19Updated 5 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- SSTP VPN client for Linux☆18Updated 4 years ago
- Stolen WiFi Aggregate Tunneling Protocol Dæmon (RAID your internet connections!)☆17Updated 12 years ago
- Dines is the definitive answer to DNS testing☆22Updated 6 years ago
- ☆12Updated 8 years ago
- I2P bindings for Twisted.☆15Updated 2 years ago
- A space-optimized binary tree for storing IP addresses☆13Updated 7 years ago
- DNS proxy listens for incoming DNS requests on the local interface and resolves the hosts using an external PHP script, through http prox…☆49Updated 2 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Gateway between SMTP/POP3 and TOX protocol.☆13Updated 7 years ago
- RESTful interface to your operating system shell☆19Updated 7 years ago
- DNS tunnel☆60Updated 11 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- TCP tunnel with Vernam Encryption☆26Updated 9 years ago
- Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams suc…☆10Updated 10 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 11 years ago
- TCP proxy with trunking/striping support☆15Updated 6 years ago
- Code to disrupt the Tox network for hardening/testing purposes.☆34Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 4 months ago
- sign elf binaries with GPG☆18Updated 8 years ago