twisted-pear / mcfdLinks
A proxy for encrypting TCP connections.
☆11Updated 8 years ago
Alternatives and similar repositories for mcfd
Users that are interested in mcfd are comparing it to the libraries listed below
Sorting:
- googleusercontent.com as HTTP(S) proxy☆54Updated 5 years ago
- Host files with DNS☆33Updated 9 years ago
- TCP tunnel with Vernam Encryption☆26Updated 10 years ago
- PPPoAT - PPP over Any Transport☆22Updated 4 years ago
- NetWatch System Management Mode VNC Server☆32Updated 16 years ago
- Video steganography implementation☆99Updated 8 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Remote FUSE filesystem via server-side script☆65Updated 10 years ago
- Encrypted P2P chat over ICMP.☆79Updated 10 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- Naively estimate entropic probability☆38Updated 4 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Probably one of the smallest SSL MITM proxies you can make☆183Updated 10 years ago
- Storing files in github gists, with client side transparent encryption and authentication☆28Updated 7 years ago
- ☆12Updated 8 years ago
- Bruteforces [.onion] domains☆80Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Probe LAN devices from a web browser.☆79Updated 6 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆39Updated 10 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Clash Royale protocol dissector for Wireshark☆15Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Updated 9 years ago
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Updated 8 years ago