use Fenrir to route configured network devices trough configured VPN tunnel
Project description
Fenrir provides a user friendly way to route all traffic from configured trough a VPN tunnel.
This is done via ARP Spoofing. Determined default GW on inputinterface is spoofed to configured device.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
fenrircore-0.7.0.tar.gz
(21.9 kB
view details)
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file fenrircore-0.7.0.tar.gz.
File metadata
- Download URL: fenrircore-0.7.0.tar.gz
- Upload date:
- Size: 21.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.10.10
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
15d586f0188fde70bb8fc100e193d460376232f31cf6ebdb95b9a25d0615e58f
|
|
| MD5 |
11ae7a62e4ac9c3321a32e7caf3fa406
|
|
| BLAKE2b-256 |
0dbd3cb407ef6dda870cf17490b67a37533287fde8b151ce8a3d2727ff879f99
|
File details
Details for the file fenrircore-0.7.0-py3-none-any.whl.
File metadata
- Download URL: fenrircore-0.7.0-py3-none-any.whl
- Upload date:
- Size: 25.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.10.10
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0a76d928d71c16c525b17be8b2aadc392a5c9a12a63b3fc09384fce107550fea
|
|
| MD5 |
f121bbee46878158779b222f0b53b7e3
|
|
| BLAKE2b-256 |
e3c51f0cf54541a61ebf83100d6c26f4d68caa325e8844d53ada56bcb5ba62cf
|