thanosgn / wifi-shareLinks
Instantly share your WIFI connection with your friends, using a QR code
☆47Updated last year
Alternatives and similar repositories for wifi-share
Users that are interested in wifi-share are comparing it to the libraries listed below
Sorting:
- IoT device scanner.☆41Updated 6 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- router firmwares, reverse engineering code snippets, mitm tools☆14Updated 5 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Updated 14 years ago
- A collection of crackmes☆40Updated 7 months ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 4 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆55Updated 7 years ago
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆51Updated 9 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆85Updated 4 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- ☆62Updated 12 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆17Updated 2 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Man-in-the-middle against Tor bridges☆27Updated 5 years ago
- Current CIDR-formatted list of unwanted bots caught on my systems.☆17Updated 3 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated last year
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- A docker image to host one's DNS-over-HTTPS proxy☆29Updated 6 years ago
- tamper resistant audit log☆18Updated 7 years ago
- Crash Royale Attack Kit☆40Updated 6 years ago
- The Blind Public License is a restrictive license that does not allow any person to read, view, interpret, emulate, debug, disassemble, r…☆56Updated 8 years ago
- 🛠️ Tool to bypass my school's security system to get sudo privileges on MacOS☆41Updated 5 years ago