twisted-pear / mcfdLinks
A proxy for encrypting TCP connections.
☆11Updated 8 years ago
Alternatives and similar repositories for mcfd
Users that are interested in mcfd are comparing it to the libraries listed below
Sorting:
- googleusercontent.com as HTTP(S) proxy☆54Updated 5 years ago
- Simulate data upload to boost your ratio on BitTorrent trackers☆13Updated 8 years ago
- TCP tunnel with Vernam Encryption☆26Updated 10 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- Storing files in github gists, with client side transparent encryption and authentication☆28Updated 7 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- NetWatch System Management Mode VNC Server☆31Updated 15 years ago
- PPPoAT - PPP over Any Transport☆22Updated 4 years ago
- Clash Royale protocol dissector for Wireshark☆15Updated 8 years ago
- Host files with DNS☆33Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- QUANTUM-DNS server☆19Updated 6 years ago
- Encrypted P2P chat over ICMP.☆79Updated 9 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆21Updated 15 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 10 years ago
- Grab files matching a search specification from Github☆110Updated 5 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- PoC grabbing IP address behind a VPN - Based of https://github.com/diafygi/webrtc-ips, saves all found addresses for anyone who visits wi…☆36Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Updated 9 years ago
- Fun with the TLS handshake☆31Updated 11 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- rsmware forked C#/PHP/MySQL☆14Updated 8 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Updated 3 years ago