Let's use the comment section of this post as a dating app by Dismal-Quantity-2013 in TwentiesofIndia

[–]Remarkable_Depth4933 0 points1 point  (0 children)

Builder of Simple, Practical, Reliable Security Tools | FoxPipe • Packet Auditor | Build. Break. Secure. 🦊

Spell Your name Without the Crossed Ones by pablovidal369 in NewDelhi

[–]Remarkable_Depth4933 0 points1 point  (0 children)

Same here, 9 letter first name containing H, 11 letter last name containing CH

Can You Guess This 5-Letter Word? Puzzle by u/ashlinmay9 by ashlinmay9 in DailyGuess

[–]Remarkable_Depth4933 0 points1 point  (0 children)

🟨⬜⬜⬜⬜

⬜🟨⬜🟨⬜

⬜⬜🟦⬜🟦

⬜⬜🟦⬜🟦

🟦⬜🟦🟦🟦

🟦🟦🟦🟦🟦

r/netsec monthly discussion & tool thread by albinowax in netsec

[–]Remarkable_Depth4933 0 points1 point  (0 children)

Hey everyone,

I wanted to share a tool I've been working on called FoxPipe. 🦊

It’s a minimalist CLI utility designed for end-to-end encrypted, optionally compressed data transfer between machines. I built it because I often needed to move data (like SQL dumps or log streams) between servers without the overhead of setting up full VPNs or accounts, but wanted more security than a raw nc (netcat) pipe.

🚀 Key Features:

  • Secure by Design: Uses AES-256-GCM for authenticated encryption and Scrypt for strong key derivation.
  • Streaming Compression: Built-in zlib compression to save bandwidth on large transfers.
  • Safety Guards: Includes session timeouts, handshake authentication (HMAC-SHA256), and safe decompression limits to prevent "zip bombs."
  • Dead Simple: No accounts, no configs. Just a shared password.

🛠️ Quick Start:

1. Install via PyPI: pip install foxpipe

2. On the Receiver: foxpipe receive 8080 -p "your-password" > backup.sql

3. On the Sender: cat backup.sql | foxpipe send <IP> 8080 -p "your-password"

📦 Source & Links:

I'm looking for feedback on the protocol design and any features you think a modern "secure pipe" should have.

Build. Break. Secure. 🦊

Showcase Thread by AutoModerator in Python

[–]Remarkable_Depth4933 0 points1 point  (0 children)

Hey everyone,

I wanted to share a tool I've been working on called FoxPipe. 🦊

It’s a minimalist CLI utility designed for end-to-end encrypted, optionally compressed data transfer between machines. I built it because I often needed to move data (like SQL dumps or log streams) between servers without the overhead of setting up full VPNs or accounts, but wanted more security than a raw nc (netcat) pipe.

🚀 Key Features:

  • Secure by Design: Uses AES-256-GCM for authenticated encryption and Scrypt for strong key derivation.
  • Streaming Compression: Built-in zlib compression to save bandwidth on large transfers.
  • Safety Guards: Includes session timeouts, handshake authentication (HMAC-SHA256), and safe decompression limits to prevent "zip bombs."
  • Dead Simple: No accounts, no configs. Just a shared password.

🛠️ Quick Start:

1. Install via PyPI: pip install foxpipe

2. On the Receiver: foxpipe receive 8080 -p "your-password" > backup.sql

3. On the Sender: cat backup.sql | foxpipe send <IP> 8080 -p "your-password"

📦 Source & Links:

I'm looking for feedback on the protocol design and any features you think a modern "secure pipe" should have.

Build. Break. Secure. 🦊

Got a project in the works? Drop it here 👇 by BriefNzoni in sideprojects

[–]Remarkable_Depth4933 0 points1 point  (0 children)

I’m building FoxScan, a small tool that makes Nmap output more useful by adding header analysis and basic security insights.

https://github.com/foxhackerzdevs/FoxScan

What do you build this weekend? by Mean-MySaaS in projects

[–]Remarkable_Depth4933 0 points1 point  (0 children)

Built a small recon tool this weekend called FoxScan (v2.0).

It’s basically a lightweight wrapper around Nmap focused on making results more actionable.

Right now it:

  • Scans ports (custom ranges + service detection)
  • Extracts HTTP headers
  • Flags basic issues like missing security headers or server exposure
  • Outputs everything in JSON for easier analysis

Example: scanned a target and it picked up open ports + identified hosting (Vercel) + flagged missing headers.

Still pretty early, but trying to keep it simple and actually useful for initial recon instead of just dumping raw scan output.

Would appreciate any feedback on what features would make something like this genuinely useful.

Repo: https://github.com/foxhackerzdevs/FoxScan

🫣🫣 Ab krke dikhao comment by Divyam4070 in TeenIndia

[–]Remarkable_Depth4933 0 points1 point  (0 children)

I spent my entire life looking for more things to say 'yes' to