wavemon is a wireless device monitoring application that allows you to watch signal and noise levels, packet statistics, device configuration and network parameters of your wireless network hardware. It should work (though with varying features) with all devices supported by the Linux kernel.
Available in the OpenWRT package repo.
Wiretap is a transparent, VPN-like proxy server that tunnels traffic via Wireguard and requires no special privileges to run.
Wireguard configs are generated and deployed on all of the servers. Clients can then interact with local network resources as if on the same network as the server, and optionally chain additional servers to reach new networks. Access to the Wiretap network can also be shared with other clients.
A Wiretap Server is any machine where a Wiretap binary is running the serve command. Servers receive and relay network traffic on behalf of Wiretap Clients, acting like a VPN "exit node." A Wiretap Client is any machine running the Wireguard configurations necessary to send and receive network traffic through a Wiretap Server. It functions much like a client in a VPN connection. Clients are also able to reconfigure parts of the Wiretap network dynamically using the Wiretap binary.
Seems to work like Nebula, only without the certificates expiring every year.
Subtrace is Wireshark for your Docker containers. It lets developers see all incoming and outgoing requests in their backend server so that they can resolve production issues faster. Works out-of-the-box, no code changes needed. Supports all languages (Python + Node + Go + everything else). See full payload, headers, status code, and latency.
At some point, I wondered—what if I sent a packet using a transport protocol that didn’t exist? Not TCP, not UDP, not even ICMP—something completely made up. Would the OS let it through? Would it get stopped before it even left my machine? Would routers ignore it, or would some middlebox kill it on sight? Could it actually move faster by slipping past common firewall rules?
No idea.
So I had to try.
First, I sent the packets to myself, just to see how my own machine handled the poison I made up. Then, I sent them across continents to a remote Linux machine to see if they’d actually make it
Strong communities are built off friendships. BlackGirlsHack has virtual and onsite events to provide networking opportunities to our members. Building strong foundations in the community is part of our mission.
BlackGirlsHack features valuable resources such as trainings, discounted certification vouchers, and early and mid-career mentoring, We seek to try and eliminate any barriers to breaking into careers in technology and cybersecurity. We have mentoring, resume review and mock interview services to help our members not only get their next job but stay there.
The field of Cybersecurity is ever changing. This is why we are starting various exciting programs. Early Education Outreach to Middle Schools/High Schools and Community Colleges to support Entry into the field through our We Got Next Cyber and BlackKidsHack programs. Professional development classes in Cyber and Tech by leading educators and professionals. Soft Skills and Leadership Classes/Training provides well rounded cyber and technology professionals.
Self-hosting the things you used to put on the cloud might be appealing for you. Problem is, you'd like to be able to access your devices from anywhere. The solution is a virtual private network, or VPN. If you work remotely, you almost certainly are familiar with the process of connecting to a VPN to access your organization's network assets. Individuals can set up the same.
There are plenty of commercial implementations of Wireguard. Probably the best-known (and best-regarded) is Tailscale. And Tailscale is indeed fantastic! But in the spirit of owning as much of our stack as possible, I'm going to show you how to implement a Wireguard-based network from scratch, without third-party tools.
mTCP is a set of TCP/IP applications for personal computers running PC-DOS, MS-DOS, FreeDOS, and other flavors of DOS. The applications include a DHCP client, FTP client and server, HTTP getter and server, IRC client, netcat implementation, network drive share client, ping utility (natch), packet sniffer, SNTP client, and telnet client.
mTCP runs on all variants of DOS including IBM PC-DOS, Microsoft MS-DOS, DR-DOS and FreeDOS. All of these applications will run well on the oldest, slowest PC that you can find - I routinely use them on an IBM PCjr made in 1983 because nothing beats the fun of putting a 39 year old computer on the Internet.
People are using mTCP for goofing off and for real work. If you have a DOS machine that needs to send data across the network mTCP can help you get that done. Besides its utility to vintage computers I have heard of people using it to transfer lab data from dedicated industrial PCs, allowing backups to be run on old machines, and sending sales reports from the branch offices of a retail store to a central server.
Don't have a vintage computer laying around? No problem! mTCP applications will run in a variety of virtual and emulated environments. It has been tested with modified DOSBox builds, VirtualBox, VMWare, and QEMU. See the documentation for the details.
mTCP applications should work on any IBM PC compatible personal computer running DOS. To be more specific, an IBM PC compatible with an 8088 or better CPU, 96KB to 384KB of system memory depending on the application, DOS v2.1 or newer, and a network interface that has a packet driver like NDIS or ODI.
Intercepting and interfering with DNS traffic from your OpenWRT firewall.
Reticulum is the cryptography-based networking stack for building local and wide-area networks with readily available hardware. It can operate even with very high latency and extremely low bandwidth. Reticulum allows you to build wide-area networks with off-the-shelf tools, and offers end-to-end encryption and connectivity, initiator anonymity, autoconfiguring cryptographically backed multi-hop transport, efficient addressing, unforgeable delivery acknowledgements and more.
The vision of Reticulum is to allow anyone to be their own network operator, and to make it cheap and easy to cover vast areas with a myriad of independent, inter-connectable and autonomous networks. Reticulum is not one network. It is a tool for building thousands of networks. Networks without kill-switches, surveillance, censorship and control. Networks that can freely interoperate, associate and disassociate with each other, and require no central oversight. Networks for human beings. Networks for the people.
Reticulum is a complete networking stack, and does not rely on IP or higher layers, but it is possible to use IP as the underlying carrier for Reticulum. It is therefore trivial to tunnel Reticulum over the Internet or private IP networks. Having no dependencies on traditional networking stacks frees up overhead that has been used to implement a networking stack built directly on cryptographic principles, allowing resilience and stable functionality, even in open and trustless networks. No kernel modules or drivers are required. Reticulum runs completely in userland and can run on practically any system that runs Python 3.
An open source, self-hosted implementation of the Tailscale control server.
Tailscale is a modern VPN built on top of Wireguard. It works like an overlay network between the computers of your networks using NAT traversal. Everything in Tailscale is Open Source, except the GUI clients for proprietary OS (Windows and macOS/iOS), and the control server. The control server works as an exchange point of Wireguard public keys for the nodes in the Tailscale network. It assigns the IP addresses of the clients, creates the boundaries between each user, enables sharing machines between users, and exposes the advertised routes of your nodes.
Headscale's goal is to provide self-hosters and hobbyists with an open-source server they can use for their projects and labs. It implements a narrow scope, a single Tailnet, suitable for a personal use, or a small open-source organisation. Please note that we do not support nor encourage the use of reverse proxies and container to run Headscale.
Seems like I could replace Nebula with this. And worry much less about Nebula certs silently expiring and fucking things up.
Bufferbloat is the undesirable latency that comes from a router or other network equipment buffering too much data. It is a huge drag on Internet performance created, ironically, by previous attempts to make it work better. The one-sentence summary is “Bloated buffers lead to network-crippling latency spikes.”
The bad news is that bufferbloat is everywhere, in more devices and programs than you can shake a stick at. The good news is, bufferbloat is now, after 4 years of research, development and deployment, relatively easy to fix. The even better news is that fixing it may solve a lot of the service problems now addressed by bandwidth caps and metering, making the Internet faster and less expensive for both users and providers.
Paracon is a packet radio terminal for Linux, Mac and Windows. It is focused on simplicity and ease of use, and incorporates the core functionality that most packet users need without trying to include all of the bells and whistles that few would use.
Multiple simultaneous AX.25 connected mode sessions, allowing for connections to multiple BBS or other remote nodes. Unproto (UI, or datagram) AX.25 mode, allowing for keyboard-to-keyboard chat or other non-connected uses. Text-based console application looks and behaves the same on all supported platforms (Linux, Mac, Windows). Uses the AGWPE protocol to communicate with any server implementing that protocol. Tested and supported with Direwolf, ldsped and AGWPE. Self-contained executable requires only a Python installation to run, without the need to install any additional dependencies.
Schnoz is a tool that I wrote in Python to monitor network traffic and analyze potential threats. I compiled all of the small scripts regarding network analysis to create a multirange tool. Please make sure that you have scapy installed. Implements active network sniffing, pulling from pcap files, alerting on specific traffic parameters, and analysis of captured HTTP traffic.
TeensyROM is a ROM emulator, fast loader, MIDI and Internet cartridge for the Commodore 64/128 based on the Teensy v4.1 microcontroller board. TeensyROM now supports an NFC Loading System. Just tap an NFC tag on a reader to start any program. Designed with medium soldering skills in mind.
Load disk images, PRGs, P00s, CRTs from flash drive, on-board flash storage, microSD card, or across the network. Plug a MIDI device into the USB port and play your SID chip in realtime; works with many composition and sequencing packages. Works with modern Commodore networking software, emulates a modem for terminal emulators. Configuration stored in on-board non-volatile storage.
This Github is created to share knowledge about data diodes, also known as unidirectional gateways, to a wider audience. The data diode concept of unidirectional traffic is easy to understand but we noticed that when starting with the data diodes in the real world there are some barriers to overcome. This workshop will help you to start with the basic concept of data diodes while keeping the costs to a minimum.
What is this? Well, it’s a guide to a bunch of concepts that you might see in networking. It’s not Network Programming in C—see Beej’s Guide to Network Programming1 for that. But it is here to help make sense of the terminology, and also to do a bit of network programming in Python.
Is it Beej’s Guide to Network Programming in Python? Well, kinda, actually. The C book is more about how C’s (well, Unix’s) network API works. And this book is more about the concepts underlying it, using Python as a vehicle.
How to configure and use the virtual modem in DOSbox. Rather than dialing phone numbers, you dial IPv4 address/port pairs.
Trippy combines the functionality of traceroute and ping and is designed to assist with the analysis of networking issues. Supports multiple protocols over IPv4 and v6. Network and payload are customizable. Supports multiple routing schemes. Can run without privileges. Text-based interface. Can generate multiple kinds of reports, including Graphviz dot charts.
Legend has it that once upon a time a networking instructor named Bob taught a class of students a method of subnetting any address using a special chart. This was known as the Bob Maneuver. These students, being the smart type that networking students usually are, added a row to the top of the chart and the Enhanced Bob Maneuver was born. The chart and instructions on how to use it follow. With practice, you should be able to subnet any address and come up with an IP plan in under a minute. After all, it's just math!
A collection of things for cabin living.
The project is an exploration of ideas. Always follow appropriate safety procedures, consult local laws and ordinances regarding safety and construction, and never assume anything is safe until verified. The author is not responsible for any damage to property, injuries, or worse, which may be caused by using any of the information presented here.