Warpinator for Android is an unofficial port of Linux Mint's file sharing tool of the same name. It is fully compatible with the original protocol and allows for easy transfer of files between Android and Linux devices.
Features:
- Automatic discovery of compatible services on local network
- Works on WiFi or hotspot, no internet connection needed
- Transfer any type of files quickly and easily
- Receive entire directories
- Run multiple transfers in parallel
- Share files from other applications
- Limit who can connect using a group code
- Option to start on boot
- Does not require your location or any other unnecessary permissions
Android
https://github.com/slowscript/warpinator-android
https://f-droid.org/packages/slowscript.warpinator/
Linux
https://github.com/linuxmint/warpinator
Windows
https://winpinator.swisz.cz
https://github.com/slowscript/warpinator-windows
#share #transfer
Features:
- Automatic discovery of compatible services on local network
- Works on WiFi or hotspot, no internet connection needed
- Transfer any type of files quickly and easily
- Receive entire directories
- Run multiple transfers in parallel
- Share files from other applications
- Limit who can connect using a group code
- Option to start on boot
- Does not require your location or any other unnecessary permissions
Android
https://github.com/slowscript/warpinator-android
https://f-droid.org/packages/slowscript.warpinator/
Linux
https://github.com/linuxmint/warpinator
Windows
https://winpinator.swisz.cz
https://github.com/slowscript/warpinator-windows
#share #transfer
GitHub
GitHub - slowscript/warpinator-android: An unofficial implementation of Warpinator for Android
An unofficial implementation of Warpinator for Android - slowscript/warpinator-android
👍20❤1🥱1
Betterfox
Set of about:config options for Mozilla #Firefox
It aims to improve browser settings for privacy-conscious users.
Betterfox is also capable of significantly increasing Firefox browsing speed.
https://github.com/yokoffing/Betterfox
Set of about:config options for Mozilla #Firefox
It aims to improve browser settings for privacy-conscious users.
Betterfox is also capable of significantly increasing Firefox browsing speed.
https://github.com/yokoffing/Betterfox
GitHub
GitHub - yokoffing/Betterfox: Firefox user.js for optimal privacy and security. Your favorite browser, but better.
Firefox user.js for optimal privacy and security. Your favorite browser, but better. - yokoffing/Betterfox
👍13❤9🔥3
Pandora
A red team tool that assists into extracting/dumping master credentials and/or entries from different #password managers.
This is a red team tool that assists in gathering credentials from different password managers. They are separated into three categories, Windows 10 desktop applications, browsers, and browser plugins. This may work on other OS, like Linux, but it is not tested yet. In this release (v1.0), the tool supports 14 password managers, with 18 different implementations (e.g., the tool could dump credentials either from the desktop app, or the browser plugin of the same product). Specifically, in most cases, password managers must be up and unlocked for the tool to work.
https://github.com/efchatz/pandora
A red team tool that assists into extracting/dumping master credentials and/or entries from different #password managers.
This is a red team tool that assists in gathering credentials from different password managers. They are separated into three categories, Windows 10 desktop applications, browsers, and browser plugins. This may work on other OS, like Linux, but it is not tested yet. In this release (v1.0), the tool supports 14 password managers, with 18 different implementations (e.g., the tool could dump credentials either from the desktop app, or the browser plugin of the same product). Specifically, in most cases, password managers must be up and unlocked for the tool to work.
https://github.com/efchatz/pandora
GitHub
GitHub - efchatz/pandora: A red team tool that assists into extracting/dumping master credentials and/or entries from different…
A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers. - efchatz/pandora
👍8
Invidious is currently being blocked by Google. Use Materialious on Android or Desktop to get around this with local video fallback.
#yt
#yt
GitHub
GitHub - Materialious/Materialious: Materialious is a modern material design frontend for Invidious, focused on a clean, privacy…
Materialious is a modern material design frontend for Invidious, focused on a clean, privacy-friendly YouTube experience. It supports local video fallback when Invidious fails and is available on W...
👍17
In case you're searching for wifi and Ethernet #routers with open source #Openwrt Linux distribution here's some trustworthy ones
Openwrt One
https://openwrt.org/toh/openwrt/one
https://docs.banana-pi.org/en/OpenWRT-One/BananaPi_OpenWRT-One
Turris
https://www.turris.com
https://openwrt.org/toh/turris/turris_omnia
GL-inet
https://www.gl-inet.com
https://openwrt.org/toh/gl.inet/start
Openwrt One
https://openwrt.org/toh/openwrt/one
https://docs.banana-pi.org/en/OpenWRT-One/BananaPi_OpenWRT-One
Turris
https://www.turris.com
https://openwrt.org/toh/turris/turris_omnia
GL-inet
https://www.gl-inet.com
https://openwrt.org/toh/gl.inet/start
BananaPi Docs
Banana Pi OpenWrt One Router
Banana Pi OpenWrt One router official support by OpenWrt community
👍23❤5🔥2
Forwarded from Beechat Network
This media is not supported in your browser
VIEW IN TELEGRAM
26/11/2024
Today at PMRExpo in Cologne we launched our long awaited new high performance encrypted radio system Kaonic 1S. We demoed file sending, live audio calls, and encrypted messaging.
- cryptographic mesh: Kaonic uses Rust-based Reticulum mesh networking with up to 128 network hops (10X compared to LoRa)
- performance: Kaonic 1S features dual radios for simultaneous operations unlocking new capabilities like live audio/video. Each radio has data rates of up to 2400 kbps and 600 kbps for CE/FCC versions.
- open source software and firmware and modularity: soon to be published on GitHub, all code will be available on MIT License. Kaonic 1S runs Yocto Linux. Featuring expansion ports for FPGA, microphones, speakers, sensors and dual USB-C connectors.
Kaonic is more than a radio module, it’s a full featured radio-based single board computer set to revolutionise decentralised communications.
Click here to order a Kaonic 1S today!
Today at PMRExpo in Cologne we launched our long awaited new high performance encrypted radio system Kaonic 1S. We demoed file sending, live audio calls, and encrypted messaging.
- cryptographic mesh: Kaonic uses Rust-based Reticulum mesh networking with up to 128 network hops (10X compared to LoRa)
- performance: Kaonic 1S features dual radios for simultaneous operations unlocking new capabilities like live audio/video. Each radio has data rates of up to 2400 kbps and 600 kbps for CE/FCC versions.
- open source software and firmware and modularity: soon to be published on GitHub, all code will be available on MIT License. Kaonic 1S runs Yocto Linux. Featuring expansion ports for FPGA, microphones, speakers, sensors and dual USB-C connectors.
Kaonic is more than a radio module, it’s a full featured radio-based single board computer set to revolutionise decentralised communications.
Click here to order a Kaonic 1S today!
👍7❤2💩2
Forwarded from Beechat Network
Medium
Introducing Kaonic: long-range radio mesh networking SBC (single-board computer) with 10X speeds over existing mesh networks
In a world where communication networks are fragile and privacy is constantly under threat, the need for robust, secure, and decentralised…
Forwarded from Beechat Network
Simulated area coverage between two Kaonic 1S at 1 Watt output power at 2 metre antenna height:
87 km² (54 mi²)
87 km² (54 mi²)
Forwarded from Beechat Network
Simulated area coverage between two Kaonic 1S at 1 Watt output power at 500 metre antenna altitude (drone scenario):
926 km² (575 mi²)
926 km² (575 mi²)
Forwarded from Beechat Network
https://beechat.network/2024/12/01/how-to-simulate-kaonics-range-for-your-area-with-radio-mobile-online/
Check out our latest blog post:
How to simulate Kaonic’s range for your area with Radio Mobile Online
Check out our latest blog post:
How to simulate Kaonic’s range for your area with Radio Mobile Online
Forwarded from Beechat Network
Kaonic will enable unstoppable, uncensorable mesh networks everywhere. Our production is now ramping up and nothing can stop it
👍3
Forwarded from Beechat Network
Our previous product Beechat Clip had only one radio to which users needed to connect via USB. Each radio module was region specific, so when travelling to a region with other frequency bands, the module would not work in that region. It had a maximum of 32 network hops.
Over the last year, we've developed Kaonic:
- 2x independent radios
- Live audio call capability (instead of walkie-talkie "push-to-talk")
- Frequency switchable for different regions (868/900 MHz)
- Longer range at highest data rate option (over 200%)
- More than 200% maximum data rate from previous model (250 vs 600 kbps)
- Capability to connect not only via USB, but also via WiFi tethering, and Bluetooth pairing
- Up to 128 network hops for globally scalable networks
- Open source firmware
- End-to-end encrypted
Over the last year, we've developed Kaonic:
- 2x independent radios
- Live audio call capability (instead of walkie-talkie "push-to-talk")
- Frequency switchable for different regions (868/900 MHz)
- Longer range at highest data rate option (over 200%)
- More than 200% maximum data rate from previous model (250 vs 600 kbps)
- Capability to connect not only via USB, but also via WiFi tethering, and Bluetooth pairing
- Up to 128 network hops for globally scalable networks
- Open source firmware
- End-to-end encrypted
Forwarded from M Bednarik
Could you please explain (for a regular end user) exactly how to communicate with other Kaonic radios, send text, audio files, etc.
Has any end-user software been written yet? In other words, as a non-dev, how would I use it?
Has any end-user software been written yet? In other words, as a non-dev, how would I use it?
Forwarded from Beechat Network
1. Install the Kaonic app: the download link will be on the QR code within the package
2. Create an account (no information is sent to any server) you can do this purely offline.
3. Log in
4. You can start scanning the network around you and find surrounding nodes.
5. Click on a user to begin chatting, sending files or even start an audio call
2. Create an account (no information is sent to any server) you can do this purely offline.
3. Log in
4. You can start scanning the network around you and find surrounding nodes.
5. Click on a user to begin chatting, sending files or even start an audio call
Forwarded from Beechat Network
Kaonic is compatible with Android, Windows, Mac, Linux and iOS.
However iOS doesn't provide open access to USB ports, so only WiFi/BT tethering will work with it.
However iOS doesn't provide open access to USB ports, so only WiFi/BT tethering will work with it.
Forwarded from Beechat Network
Kaonic 1S is our flagship Single Board Computer with dual integrated long range radios.
It enables capabilities that were only available to the military sector before, such as encrypted live audio calls over mesh networks.
Meshing is based on the revolutionary Reticulum mesh network, with our own backwards compatible Rust port for much higher performance.
Our firmware and software is open source, allowing users to modify the system to their own needs and providing full transparency of the system’s capabilities.
Kaonic is the future of decentralised off grid communication.
It enables capabilities that were only available to the military sector before, such as encrypted live audio calls over mesh networks.
Meshing is based on the revolutionary Reticulum mesh network, with our own backwards compatible Rust port for much higher performance.
Our firmware and software is open source, allowing users to modify the system to their own needs and providing full transparency of the system’s capabilities.
Kaonic is the future of decentralised off grid communication.
🔥16
Find out the #IP address through a call to #Telegram
https://medium.com/@ibederov_en/find-out-the-ip-address-through-a-call-to-telegram-a899441b1bac
Github: https://github.com/n0a/telegram-get-remote-ip
Note: Only if user has enabled Peer to Peer Calls
#tg
https://medium.com/@ibederov_en/find-out-the-ip-address-through-a-call-to-telegram-a899441b1bac
Github: https://github.com/n0a/telegram-get-remote-ip
Note: Only if user has enabled Peer to Peer Calls
#tg
Medium
Find out the IP address through a call to Telegram…
1️⃣ Download Wireshark (https://www.wireshark.org/download.html), open it and be sure to specify the protocol we need in the filter — STUN…
👍6
How to trace IP of someone's id in telegram using Golang!
Code:
Code:
package mai
import (
"fmt"
"log"
"os"
"os/exec"
"strings"
)
func main() {
const CAP_PATH = "/tmp/tg_cap.pcap" // Temporary path for pcap capture file
const CAP_TEXT = "/tmp/tg_text.txt" // Temporary path for text file with information
const CAP_DURATION = "5" // Capture duration in seconds
// Get the external IP address of the device
ipCmd := exec.Command("curl", "-s", "icanhazip.com")
ipOutput, err := ipCmd.Output()
if err != nil {
log.Fatal("Failed to get IP address:", err)
}
MY_IP := strings.TrimSpace(string(ipOutput))
// Check if Wireshark is installed
_, err = exec.LookPath("tshark")
if err != nil {
log.Println("[-] Wireshark not found. Try installing Wireshark first.")
log.Println("[+] Debian-based: sudo apt-get install -y tshark")
log.Println("[+] RedHat-based: sudo yum install -y tshark")
os.Exit(1)
}
fmt.Println("[+] Discovering User's IP Address on Telegram using Golang")
fmt.Println("[+] Starting traffic capture. Please wait for", CAP_DURATION, "seconds...")
// Start traffic capture with Wireshark
captureCmd := exec.Command("tshark", "-w", CAP_PATH, "-a", "duration:"+CAP_DURATION)
captureOutput, err := captureCmd.CombinedOutput()
if err != nil {
log.Fatal("Traffic capture error:", err)
}
fmt.Println("[+] Traffic captured.")
// Convert pcap file to readable text file
convertCmd := exec.Command("tshark", "-r", CAP_PATH)
convertOutput, err := convertCmd.Output()
if err != nil {
log.Fatal("Error converting pcap file to text:", err)
}
err = os.WriteFile(CAP_TEXT, convertOutput, 0644)
if err != nil {
log.Fatal("Error writing text file:", err)
}
fmt.Println("[+] Pcap file successfully converted to text.")
// Check if Telegram traffic is present in the text file
if strings.Contains(string(convertOutput), "STUN 106") {
fmt.Println("[+] Telegram traffic found.")
// Extract the IP address from the text
extractCmd := exec.Command("cat", CAP_TEXT, "|", "grep", "STUN 106", "|", "sed", "'s/^.*XOR-MAPPED-ADDRESS: //'", "|", "awk", "'{match($0,/[0-9]+\\.[0-9]+\\.[0-9]+\\.[0-9]+/); ip = substr($0,RSTART,RLENGTH); print ip}' | awk '!seen[$0]++'")
extractOutput, err := extractCmd.Output()
if err != nil {
log.Fatal("Error extracting IP address:", err)
}
TG_OUT := strings.TrimSpace(string(extractOutput))
IP_1 := strings.Fields(TG_OUT)[0]
IP_2 := strings.Fields(TG_OUT)[1]
var IP string
// Check if the IP address is ours or the recipient's
if MY_IP == IP_1 {
IP = IP_2
} else if MY_IP == IP_2 {
IP = IP_1
} else {
IP = "[-] Sorry. IP address not found."
os.Exit(1)
}
// Get host information for the IP address
hostCmd := exec.Command("host", IP)
hostOutput, err := hostCmd.Output()
if err != nil {
log.Fatal("Error getting host information:", err)
}
fmt.Println("[+]")
fmt.Println("[+] IP Address:", IP)
fmt.Println("[+] Host:", strings.TrimSpace(string(hostOutput)))
fmt.Println("[+]")
// Clean up temporary files
err = os.Remove(CAP_PATH)
if err != nil {
log.Fatal("Cleanup error:", err)
}
err = os.Remove(CAP_TEXT)
if err != nil {
log.Fatal("Cleanup error:", err)
}
fmt.Println("[+] Cleanup completed.")
} else {
fmt.Println("[-] Telegram traffic not found.")
fmt.Println("[!]")
fmt.Println("[!] Run this script only >>>AFTER<<< the response.")
fmt.Println("[!]")
os.Exit(1)
}
fmt.Println("[?]")
fmt.Print("[?] Run whois", IP, "? (Y/N): ")
// Check if the user wants to run the whois command
var answer string
fmt.Scanln(&answer)👍2❤1
Continuation:
Source: Internet :)
if strings.ToUpper(answer) == "Y" {
whoisCmd := exec.Command("whois", IP)
whoisOutput, err := whoisCmd.Output()
if err != nil {
log.Fatal("Error running whois command:", err)
}
fmt.Println(string(whoisOutput))
} else {
fmt.Println("[+] Goodbye!")
os.Exit(0)
}
}Source: Internet :)