mdns - basic mdns server and discovery client

  •        139

A simple mDNS client for device discovery on your local network. The udp server doesn't start automatically, this gives you a chance to bring up your network interface, before starting the server, especially useful when using this with Nerves. To start the server, call Mdns.Server.start. To handle :a record requests you will want to set the ip address. This can change periodically, or you may have multiple interfaces. Set or update the ip address used for query responses by calling Mdns.Server.set_ip({192, 168, 1, 4}).

https://github.com/rosetta-home/mdns

Tags
Implementation
License
Platform

   




Related Projects

mdns - Simple mDNS client/server library in Golang

  •    Go

Simple mDNS client/server library in Golang. mDNS or Multicast DNS can be used to discover services on the local network without the use of an authoritative DNS server. This enables peer-to-peer discovery. It is important to note that many networks restrict the use of multicasting, which prevents mDNS from functioning. Notably, multicast cannot be used in any sort of cloud, or shared infrastructure environment. However it works well in most office, home, or private infrastructure environments.

Inveigh - Inveigh is a Windows PowerShell LLMNR/mDNS/NBNS spoofer/man-in-the-middle tool

  •    PowerShell

Inveigh is a PowerShell LLMNR/mDNS/NBNS spoofer and man-in-the-middle tool designed to assist penetration testers/red teamers that find themselves limited to a Windows system. At its core, Inveigh is a .NET packet sniffer that listens for and responds to LLMNR/mDNS/NBNS requests while also capturing incoming NTLMv1/NTLMv2 authentication attempts over the Windows SMB service. The primary advantage of this packet sniffing method on Windows is that port conflicts with default running services are avoided. Inveigh also contains HTTP/HTTPS/Proxy listeners for capturing incoming authentication requests and performing attacks. Inveigh relies on creating multiple runspaces to load the sniffer, listeners, and control functions within a single shell and PowerShell process.

HomePWN - HomePwn - Swiss Army Knife for Pentesting of IoT Devices

  •    Python

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day work and inside the same working environment. It is designed to find devices in the home or office, take advantage of certain vulnerabilities to read or send data to those devices. With a strong library of modules you can use this tool to load new features and use them in a vast variety of devices. Discovery modules. These modules provide functionalities related to the discovery stage, regardless of the technology to be used. For example, it can be used to conduct WiFi scans via an adapter in monitor mode, perform discovery of BLE devices, Bluetooth Low-Energy, which other devices are nearby and view their connectivity status, etc. Also, It can be used to discover a home or office IoT services using protocols such as SSDP or Simple Service Discovery Protocol and MDNS or Multicast DNS.

node_mdns - mdns/zeroconf/bonjour service discovery add-on for node.js

  •    Javascript

mdns/zeroconf/bonjour service discovery add-on for node.js

airpaste - A 1-1 network pipe that auto discovers other peers using mdns

  •    Javascript

A 1-1 network pipe that auto discovers other peers using mdns


Responder - Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication

  •    Python

Responder an LLMNR, NBT-NS and MDNS poisoner. It will answer to specific NBT-NS (NetBIOS Name Service) queries based on their name suffix (see: http://support.microsoft.com/kb/163409). By default, the tool will only answer to File Server Service request, which is for SMB. The concept behind this is to target our answers, and be stealthier on the network. This also helps to ensure that we don't break legitimate NBT-NS behavior. You can set the -r option via command line if you want to answer to the Workstation Service request name suffix.

mod_rendezvous

  •    C

mod_rendezvous is an Apache 1.3.x module which registers httpd servers in on Rendezvous (ZeroConf/mDNS), and thus be visible in Apple's Safari browser and any other browser which supports mDNS/ZeroConf/Rendezvous.

Zero configuration

  •    

When you read zeroconf, read Bonjour and UPnP. Bonjour is an Apple protocol which does the same thing as UPnP : Service Discovery. This project is a FULL .NET implementation. With this implementation comes a partial object implementation of the DNS protocol.

bonjour - A Bonjour/Zeroconf protocol implementation in JavaScript

  •    Javascript

A Bonjour/Zeroconf protocol implementation in pure JavaScript. Publish services on the local network or discover existing services using multicast DNS.The options are optional and will be used when initializing the underlying multicast-dns server. For details see the multicast-dns documentation.

ipp-printer - An IPP printer written in Node.js

  •    Javascript

Create a printer on your network using nothing but Node.js. This module implements version 1.1 of the IPP protocol and uses Bonjour/Zeroconf to advertise a printer on your local network that anyone can print to.For a video introduction, check out the talk I gave at Node.js Interactive 2015 in Portland.

node-airplay - Apple AirPlay client library for node.js

  •    Javascript

node-airplay is a client library for Apple's AirPlay remote playback protocol. It implements a simple AirPlay device browser using mdns and command interface. node-airplay depends on both node-plist and node_mdns. Unfortunately node_mdns is woefully out of date and has required many tweaks to get working, resulting in a fork.

iSniff-GPS - Passive sniffing tool for capturing and visualising WiFi location data disclosed by iOS devices

  •    Python

iSniff GPS passively sniffs for SSID probes, ARPs and MDNS (Bonjour) packets broadcast by nearby iPhones, iPads and other wireless devices. The aim is to collect data which can be used to identify each device and determine previous geographical locations, based solely on information each device discloses about previously joined WiFi networks. iOS devices transmit ARPs which sometimes contain MAC addresses (BSSIDs) of previously joined WiFi networks, as described in [1]. iSniff GPS captures these ARPs and submits MAC addresses to Apple's WiFi location service (masquerading as an iOS device) to obtain GPS coordinates for a given BSSID. If only SSID probes have been captured for a particular device, iSniff GPS can query network names on wigle.net and visualise possible locations.

fossa - Async non-blocking multi-protocol networking library for C/C++

  •    C

Fossa is a multi-protocol networking library written in C. It provides easy to use event-driven interface that allows to implement network protocols or scalable network applications with little effort. Fossa helps developers to manage the complexity of network programming and let them concentrate on the logic, saving time and money. Fossa has built-in support for several protocols, like HTTP, Websocket, MQTT, mDNS. Example applications include Websocket-based chat server, JSON-RPC server, database server with RESTful API, MQTT broker, netcat with SSL and hexdump, Raspberry PI camera video feed + led control, and more.

Arduino - ESP8266 core for Arduino

  •    C

This project brings support for ESP8266 chip to the Arduino environment. It lets you write sketches using familiar Arduino functions and libraries, and run them directly on ESP8266, no external microcontroller required. ESP8266 Arduino core comes with libraries to communicate over WiFi using TCP and UDP, set up HTTP, mDNS, SSDP, and DNS servers, do OTA updates, use a file system in flash memory, work with SD cards, servos, SPI and I2C peripherals.

rust-rosetta - Implementing Rosetta Code problems in Rust.

  •    Rust

Development is done on the nightly channel of Rust. You can get this using rustup.Important: Not all rust-rosetta tasks exist in their current form on Rosetta Code. Please cross-check with this repository before you start. Alternatively, check out rust-rosetta coverage to see an automatically generated report of which tasks have been implemented where.

django-rosetta - Rosetta is a Django application that eases the translation process of your Django projects

  •    Python

Rosetta is a Django application that eases the translation process of your Django projects. Because it doesn't export any models, Rosetta doesn't create any tables in your project's database. Rosetta can be installed and uninstalled by simply adding and removing a single entry in your project's INSTALLED_APPS and a single line in your main urls.py file.

KouChat - Serverless, LAN chat application for the desktop and Android.

  •    Java

KouChat is an open source, serverless, LAN chat application for the desktop and Android. With KouChat you can chat and send files to other KouChat users on the same local area network. It’s intended to be used on your network at home, the coffee shop, work place or similar, and does not require any setup, Internet connection or servers to function.

Web PDB

  •    Perl

This program is a perl CGI script that accesses Address and Datebook PDB files (via Palm::PDB). It is intended for a home or office LAN. It basically publishes the information stored in the PDB files so that anyone on the LAN (e.g. my wife) can view it.

dns-rebind-toolkit - A front-end JavaScript toolkit for creating DNS rebinding attacks.

  •    Javascript

DISCLAIMER: This software is for educational purposes only. This software should not be used for illegal activity. The author is not responsible for its use. Don't be a dick. DNS Rebind Toolkit is a frontend JavaScript framework for developing DNS Rebinding exploits against vulnerable hosts and services on a local area network (LAN). It can be used to target devices like Google Home, Roku, Sonos WiFi speakers, WiFi routers, "smart" thermostats, and other IoT devices. With this toolkit, a remote attacker can bypass a router's firewall and directly interact with devices on the victim's home network, exfiltrating private information and in some cases, even controlling the vulnerable devices themselves.

Rosetta Engine

  •    

Rosetta is a full text engine entirely written in C++ with dotnet binding. It will provide same functionnaly than lucene with more flexibility, speed and scale up.






We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.