
-
The Company
- Olympia, Greece
- https://acid.vegas
- @acidvegas
- https://gitlab.com/acidvegas
- https://git.supernets.org/acidvegas
Lists (1)
Sort Name ascending (A-Z)
Starred repositories
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
Add any model you want to the Cursor IDE.
A Model Context Protocol (MCP) server implementation that provides Elasticsearch interaction.
docker / mcp-servers
Forked from modelcontextprotocol/serversModel Context Protocol Servers
A BBS server for Meshtastic for posting bulletins, sending mail to users, and channel directory.
An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.
Autonomous coding agent right in your IDE, capable of creating/editing files, executing commands, using the browser, and more with your permission every step of the way.
Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets
The Universal Device Detection library will parse any User Agent and detect the browser, operating system, device used (desktop, tablet, mobile, tv, cars, console, etc.), brand and model.
The recursive internet scanner for hackers. 🧡
JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way.
Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)
Spooftest by SCRAMBLR is a toolkit that can check IP Spoofing IPHM Capabilities of a Server Without Snitching To Caida
p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.
Kafka Connect Elasticsearch connector
A new lightweight, hybrid routing mesh protocol for packet radios
Open-Source Web UI for Apache Kafka Management
A custom keyboard firmware for the Lilygo T-Deck
HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a …
Scapy: the Python-based interactive packet manipulation program & library.
WoL Machine Manager using IP spoofing for a good cause
IPv4 and IPv6 traceroute fake hop generator through IP spoofing
The lazier way to manage everything docker