yannayl / pingtun
icmp tunnel. nuff said.
☆24Updated 9 years ago
Alternatives and similar repositories for pingtun:
Users that are interested in pingtun are comparing it to the libraries listed below
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- ☆30Updated 9 years ago
- RESTful interface to your operating system shell☆19Updated 7 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Replicating Encrypted PasteBin☆74Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- lte security☆41Updated 9 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 8 years ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆28Updated 8 years ago
- Portable, light-weight ircd written in Go.☆53Updated 7 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Updated 8 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- A warrant canary system☆30Updated 6 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- ☆17Updated 7 years ago
- encrypt and decrypt small files using OpenSSH keys☆70Updated 11 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Updated 6 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- ☆24Updated 9 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- Detect passive activity in the Tor-network☆13Updated 9 years ago
- video onion hackery (osx scripts)☆20Updated 8 years ago