<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Projects on LANRAT</title><link>https://lanrat.com/projects/</link><description>Recent content in Projects on LANRAT</description><generator>Hugo -- 0.159.2</generator><language>en-us</language><copyright>Ian Foster</copyright><lastBuildDate>Mon, 22 Dec 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://lanrat.com/projects/rss.xml" rel="self" type="application/rss+xml"/><item><title>Cloudflare WARP Config Generator</title><link>https://lanrat.com/projects/cloudflare-warp-config-generator/</link><pubDate>Mon, 22 Dec 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/cloudflare-warp-config-generator/</guid><description>&lt;p&gt;A browser-based and CLI tool for generating WireGuard configurations compatible with Cloudflare WARP. The application generates keypairs locally in the browser or CLI, registers them with Cloudflare&amp;rsquo;s WARP API, and outputs a complete WireGuard configuration file with QR code for easy mobile import.&lt;/p&gt;
&lt;p&gt;All processing happens client-side with no server-side storage. Configuration options include DNS server selection, MTU adjustment, allowed IPs, and persistent keepalive settings. A command-line shell script is also available for terminal-based workflows.&lt;/p&gt;</description><content:encoded><![CDATA[<p>A browser-based and CLI tool for generating WireGuard configurations compatible with Cloudflare WARP. The application generates keypairs locally in the browser or CLI, registers them with Cloudflare&rsquo;s WARP API, and outputs a complete WireGuard configuration file with QR code for easy mobile import.</p>
<p>All processing happens client-side with no server-side storage. Configuration options include DNS server selection, MTU adjustment, allowed IPs, and persistent keepalive settings. A command-line shell script is also available for terminal-based workflows.</p>
<p>Example:</p>
<div class="highlight"><pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"><code class="language-shell" data-lang="shell"><span style="display:flex;"><span>./scripts/warp-register.sh &gt; warp.conf
</span></span></code></pre></div>]]></content:encoded></item><item><title>MikroTik SwOS Python Library</title><link>https://lanrat.com/projects/mikrotik-swos-python-library/</link><pubDate>Sat, 15 Nov 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/mikrotik-swos-python-library/</guid><description>&lt;p&gt;Got a bunch of MikroTik switches running SwOS or SwOS Lite with no good way to manage them centrally? This library has you covered.&lt;/p&gt;
&lt;p&gt;Built by reverse engineering the SwOS HTTP API, it provides complete programmatic access to all switch features. Works with both SwOS and SwOS Lite, supports everything from port configs and PoE to VLANs and SNMP settings.&lt;/p&gt;
&lt;p&gt;Comes with a CLI tool for quick lookups and a full Ansible module for managing your entire switch fleet through YAML playbooks. Compatible with CRS305, CRS310, CRS326, CSS610 and other SwOS-based switches.&lt;/p&gt;</description><content:encoded><![CDATA[<p>Got a bunch of MikroTik switches running SwOS or SwOS Lite with no good way to manage them centrally? This library has you covered.</p>
<p>Built by reverse engineering the SwOS HTTP API, it provides complete programmatic access to all switch features. Works with both SwOS and SwOS Lite, supports everything from port configs and PoE to VLANs and SNMP settings.</p>
<p>Comes with a CLI tool for quick lookups and a full Ansible module for managing your entire switch fleet through YAML playbooks. Compatible with CRS305, CRS310, CRS326, CSS610 and other SwOS-based switches.</p>
]]></content:encoded></item><item><title>TRMNL Plugins</title><link>https://lanrat.com/projects/trmnl-plugins/</link><pubDate>Mon, 06 Oct 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/trmnl-plugins/</guid><description>&lt;p&gt;A collection of custom plugins for &lt;a href="https://trmnl.com/?ref=mrlanrat"&gt;TRMNL&lt;/a&gt; e-ink displays. The repository provides a Docker-based development environment for creating and testing plugins that extend TRMNL functionality.&lt;/p&gt;</description><content:encoded>&lt;p>A collection of custom plugins for &lt;a href="https://trmnl.com/?ref=mrlanrat">TRMNL&lt;/a> e-ink displays. The repository provides a Docker-based development environment for creating and testing plugins that extend TRMNL functionality.&lt;/p>
</content:encoded></item><item><title>Drouter</title><link>https://lanrat.com/projects/drouter/</link><pubDate>Sun, 21 Sep 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/drouter/</guid><description>&lt;p&gt;Drouter provides dynamic route injection for Docker containers through label-based configuration. The systemd service monitors Docker containers and automatically configures static routes in their network namespaces without requiring elevated privileges within the containers themselves.&lt;/p&gt;
&lt;p&gt;The system uses Docker labels to specify routing rules and applies them automatically when containers start or stop. This enables complex networking setups where containers need custom routing tables while maintaining security by avoiding privileged container execution for network configuration tasks.&lt;/p&gt;</description><content:encoded>&lt;p>Drouter provides dynamic route injection for Docker containers through label-based configuration. The systemd service monitors Docker containers and automatically configures static routes in their network namespaces without requiring elevated privileges within the containers themselves.&lt;/p>
&lt;p>The system uses Docker labels to specify routing rules and applies them automatically when containers start or stop. This enables complex networking setups where containers need custom routing tables while maintaining security by avoiding privileged container execution for network configuration tasks.&lt;/p>
</content:encoded></item><item><title>ARIN IPv4 Waitlist Tracking</title><link>https://lanrat.com/projects/arin-ipv4-waitlist-tracking/</link><pubDate>Sat, 20 Sep 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/arin-ipv4-waitlist-tracking/</guid><description>&lt;p&gt;ARIN IPv4 Wait-list Tracking analyzes ARIN&amp;rsquo;s IPv4 address wait-list and provides statistical insights into wait times and allocation patterns. The Python-based system tracks historical data on IPv4 block requests and clearances to estimate processing times for different network block sizes.&lt;/p&gt;
&lt;p&gt;The web dashboard displays real-time analytics including current wait-list sizes, estimated wait times for /22, /23, and /24 blocks, and historical trends in IPv4 address allocation. This tool helps network administrators understand IPv4 scarcity patterns and plan address allocation strategies as IPv4 exhaustion continues.&lt;/p&gt;</description><content:encoded><![CDATA[<p>ARIN IPv4 Wait-list Tracking analyzes ARIN&rsquo;s IPv4 address wait-list and provides statistical insights into wait times and allocation patterns. The Python-based system tracks historical data on IPv4 block requests and clearances to estimate processing times for different network block sizes.</p>
<p>The web dashboard displays real-time analytics including current wait-list sizes, estimated wait times for /22, /23, and /24 blocks, and historical trends in IPv4 address allocation. This tool helps network administrators understand IPv4 scarcity patterns and plan address allocation strategies as IPv4 exhaustion continues.</p>
]]></content:encoded></item><item><title>Day Night Map</title><link>https://lanrat.com/projects/day-night-map/</link><pubDate>Sun, 27 Jul 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/day-night-map/</guid><description>&lt;p&gt;A real-time visualization of day and night regions across the world using accurate solar and lunar positioning calculations. The project renders day/night terminator lines, solar and lunar positions, and smooth twilight gradients on an interactive world map using HTML5 Canvas.&lt;/p&gt;
&lt;p&gt;The visualization integrates the SunCalc library for astronomical calculations and features optimized pixel-level rendering with support for multiple map projections (Equirectangular and Mercator). Additional features include moon phase visualization, responsive design, timezone customization, and a grayscale mode optimized for e-ink displays. The map updates every minute to reflect current celestial conditions.&lt;/p&gt;</description><content:encoded>&lt;p>A real-time visualization of day and night regions across the world using accurate solar and lunar positioning calculations. The project renders day/night terminator lines, solar and lunar positions, and smooth twilight gradients on an interactive world map using HTML5 Canvas.&lt;/p>
&lt;p>The visualization integrates the SunCalc library for astronomical calculations and features optimized pixel-level rendering with support for multiple map projections (Equirectangular and Mercator). Additional features include moon phase visualization, responsive design, timezone customization, and a grayscale mode optimized for e-ink displays. The map updates every minute to reflect current celestial conditions.&lt;/p>
</content:encoded></item><item><title>VLAN Scout</title><link>https://lanrat.com/projects/vlan-scout/</link><pubDate>Tue, 22 Jul 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/vlan-scout/</guid><description>&lt;p&gt;VLAN Scout discovers active VLANs and their configurations through passive monitoring and active probing. The tool identifies VLAN segments by analyzing network traffic and attempting connections across different VLAN IDs.&lt;/p&gt;
&lt;p&gt;The implementation supports multiple discovery protocols including DHCP, IPv6 neighbor discovery, LLDP, and CDP. VLAN Scout can operate in both passive monitoring mode to observe existing traffic and active probing mode to test VLAN accessibility and configuration.&lt;/p&gt;</description><content:encoded>&lt;p>VLAN Scout discovers active VLANs and their configurations through passive monitoring and active probing. The tool identifies VLAN segments by analyzing network traffic and attempting connections across different VLAN IDs.&lt;/p>
&lt;p>The implementation supports multiple discovery protocols including DHCP, IPv6 neighbor discovery, LLDP, and CDP. VLAN Scout can operate in both passive monitoring mode to observe existing traffic and active probing mode to test VLAN accessibility and configuration.&lt;/p>
</content:encoded></item><item><title>Bambu P1S Hacking</title><link>https://lanrat.com/projects/bambu-p1s-hacking/</link><pubDate>Sun, 13 Jul 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/bambu-p1s-hacking/</guid><description>&lt;p&gt;Bambu P1S Hacking contains firmware dumps, PCB analysis, and X-ray scans of the Bambu Labs P1S 3D printer&amp;rsquo;s ESP32-S3 controller board. The repository documents reverse engineering efforts to understand the printer&amp;rsquo;s firmware architecture and hardware implementation.&lt;/p&gt;
&lt;p&gt;The collection includes multiple firmware dumps processed through bin-voter to generate corrected flash images, detailed PCB trace analysis, and hardware documentation. This research provides insights into the printer&amp;rsquo;s embedded systems and potential modification opportunities.&lt;/p&gt;</description><content:encoded><![CDATA[<p>Bambu P1S Hacking contains firmware dumps, PCB analysis, and X-ray scans of the Bambu Labs P1S 3D printer&rsquo;s ESP32-S3 controller board. The repository documents reverse engineering efforts to understand the printer&rsquo;s firmware architecture and hardware implementation.</p>
<p>The collection includes multiple firmware dumps processed through bin-voter to generate corrected flash images, detailed PCB trace analysis, and hardware documentation. This research provides insights into the printer&rsquo;s embedded systems and potential modification opportunities.</p>
]]></content:encoded></item><item><title>Bin Voter</title><link>https://lanrat.com/projects/bin-voter/</link><pubDate>Sun, 13 Jul 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/bin-voter/</guid><description>&lt;p&gt;Bin Voter reconstructs correct binary files from multiple corrupted firmware dumps by implementing a voting algorithm across byte positions. The tool compares corresponding bytes from multiple binary files and selects the most frequently occurring value at each position.&lt;/p&gt;
&lt;p&gt;This Python utility is designed for firmware recovery scenarios where multiple partial or corrupted dumps are available but no single dump is completely intact. Bin Voter can recover clean firmware images by leveraging statistical analysis across multiple corrupted sources.&lt;/p&gt;</description><content:encoded>&lt;p>Bin Voter reconstructs correct binary files from multiple corrupted firmware dumps by implementing a voting algorithm across byte positions. The tool compares corresponding bytes from multiple binary files and selects the most frequently occurring value at each position.&lt;/p>
&lt;p>This Python utility is designed for firmware recovery scenarios where multiple partial or corrupted dumps are available but no single dump is completely intact. Bin Voter can recover clean firmware images by leveraging statistical analysis across multiple corrupted sources.&lt;/p>
</content:encoded></item><item><title>DPRK.team</title><link>https://lanrat.com/projects/dprk.team/</link><pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/dprk.team/</guid><description>&lt;p&gt;DPRK.team is a satirical website that parodies authoritarian cybersecurity organizations through the fictional &amp;ldquo;Glorious People&amp;rsquo;s Cybersecurity Directorate.&amp;rdquo; The site presents cybersecurity services using exaggerated revolutionary rhetoric and propaganda-style messaging that mimics state-controlled digital security agencies.&lt;/p&gt;
&lt;p&gt;The project serves as a humorous commentary on totalitarian approaches to cybersecurity and digital sovereignty. The website includes typical corporate sections like services, team profiles, and past work, all delivered through an over-the-top ideological lens that lampoons authoritarian cybersecurity practices and terminology.&lt;/p&gt;</description><content:encoded><![CDATA[<p>DPRK.team is a satirical website that parodies authoritarian cybersecurity organizations through the fictional &ldquo;Glorious People&rsquo;s Cybersecurity Directorate.&rdquo; The site presents cybersecurity services using exaggerated revolutionary rhetoric and propaganda-style messaging that mimics state-controlled digital security agencies.</p>
<p>The project serves as a humorous commentary on totalitarian approaches to cybersecurity and digital sovereignty. The website includes typical corporate sections like services, team profiles, and past work, all delivered through an over-the-top ideological lens that lampoons authoritarian cybersecurity practices and terminology.</p>
]]></content:encoded></item><item><title>GPM2Spotify History</title><link>https://lanrat.com/projects/gpm2spotify-history/</link><pubDate>Thu, 13 Feb 2025 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/gpm2spotify-history/</guid><description>&lt;p&gt;GPM2Spotify History converts Google Play Music listening history data to Spotify-compatible JSON format. The Python scripts process HTML activity files exported from Google Play Music and generate structured JSON data that can be used with modern music tracking and analysis tools.&lt;/p&gt;
&lt;p&gt;The conversion tool helps users migrate their historical listening data from the discontinued Google Play Music service to formats compatible with current music platforms and personal analytics tools. It parses activity HTML exports and transforms the data into standardized JSON structures for further processing.&lt;/p&gt;</description><content:encoded>&lt;p>GPM2Spotify History converts Google Play Music listening history data to Spotify-compatible JSON format. The Python scripts process HTML activity files exported from Google Play Music and generate structured JSON data that can be used with modern music tracking and analysis tools.&lt;/p>
&lt;p>The conversion tool helps users migrate their historical listening data from the discontinued Google Play Music service to formats compatible with current music platforms and personal analytics tools. It parses activity HTML exports and transforms the data into standardized JSON structures for further processing.&lt;/p>
</content:encoded></item><item><title>Scroller</title><link>https://lanrat.com/projects/scroller/</link><pubDate>Fri, 25 Oct 2024 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/scroller/</guid><description>&lt;p&gt;Scroller is a web application that displays customizable scrolling text messages in fullscreen mode. The single-page application allows users to configure text content, fonts, colors, scroll speed, and background themes before launching a fullscreen display.&lt;/p&gt;
&lt;p&gt;The application includes URL hash-based message saving, automatic text scaling to fit screens, and responsive design with light/dark mode support. It&amp;rsquo;s designed for creating dynamic text displays for presentations, signage, or any scenario requiring large-scale scrolling text output.&lt;/p&gt;</description><content:encoded><![CDATA[<p>Scroller is a web application that displays customizable scrolling text messages in fullscreen mode. The single-page application allows users to configure text content, fonts, colors, scroll speed, and background themes before launching a fullscreen display.</p>
<p>The application includes URL hash-based message saving, automatic text scaling to fit screens, and responsive design with light/dark mode support. It&rsquo;s designed for creating dynamic text displays for presentations, signage, or any scenario requiring large-scale scrolling text output.</p>
]]></content:encoded></item><item><title>Caddy Signal Proxy</title><link>https://lanrat.com/projects/caddy-signal-proxy/</link><pubDate>Wed, 25 Sep 2024 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/caddy-signal-proxy/</guid><description>&lt;p&gt;Caddy Signal Proxy implements a Signal TLS proxy using the Caddy web server and the caddy-l4 plugin. The configuration enables Signal messaging clients to connect through a TLS proxy for improved privacy or to bypass network restrictions.&lt;/p&gt;
&lt;p&gt;The deployment uses Docker Compose with a minimal configuration that can be integrated into existing Caddy setups. The proxy handles TLS termination and forwarding for Signal&amp;rsquo;s messaging infrastructure, requiring only a domain name configuration to operate.&lt;/p&gt;</description><content:encoded><![CDATA[<p>Caddy Signal Proxy implements a Signal TLS proxy using the Caddy web server and the caddy-l4 plugin. The configuration enables Signal messaging clients to connect through a TLS proxy for improved privacy or to bypass network restrictions.</p>
<p>The deployment uses Docker Compose with a minimal configuration that can be integrated into existing Caddy setups. The proxy handles TLS termination and forwarding for Signal&rsquo;s messaging infrastructure, requiring only a domain name configuration to operate.</p>
]]></content:encoded></item><item><title>Portquiz</title><link>https://lanrat.com/projects/portquiz/</link><pubDate>Tue, 16 Jan 2024 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/portquiz/</guid><description>&lt;p&gt;Portquiz tests outbound TCP and UDP connectivity to remote hosts by attempting connections across specified port ranges. The tool identifies which ports can successfully establish connections through network infrastructure such as firewalls, NAT devices, and proxies.&lt;/p&gt;
&lt;p&gt;The program can detect deep packet inspection (DPI) filtering and other network-level blocking mechanisms. It supports testing individual ports or scanning complete port ranges, with cross-platform compatibility across Windows, macOS, and Linux systems.&lt;/p&gt;</description><content:encoded>&lt;p>Portquiz tests outbound TCP and UDP connectivity to remote hosts by attempting connections across specified port ranges. The tool identifies which ports can successfully establish connections through network infrastructure such as firewalls, NAT devices, and proxies.&lt;/p>
&lt;p>The program can detect deep packet inspection (DPI) filtering and other network-level blocking mechanisms. It supports testing individual ports or scanning complete port ranges, with cross-platform compatibility across Windows, macOS, and Linux systems.&lt;/p>
</content:encoded></item><item><title>Caddy Dynamic RemoteIP</title><link>https://lanrat.com/projects/caddy-dynamic-remoteip/</link><pubDate>Tue, 12 Sep 2023 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/caddy-dynamic-remoteip/</guid><description>&lt;p&gt;Caddy Dynamic RemoteIP is a Caddy web server module that provides dynamic IP address matching capabilities. The module implements the http.matchers.dynamic_remote_ip matcher, which allows matching requests based on remote IP addresses that are dynamically sourced from configurable modules.&lt;/p&gt;
&lt;p&gt;Unlike static IP matching, this module enables real-time IP range updates through pluggable IPRangeSource implementations. This is useful for scenarios requiring dynamic access control based on changing IP ranges, such as cloud provider IP lists or threat intelligence feeds.&lt;/p&gt;</description><content:encoded>&lt;p>Caddy Dynamic RemoteIP is a Caddy web server module that provides dynamic IP address matching capabilities. The module implements the http.matchers.dynamic_remote_ip matcher, which allows matching requests based on remote IP addresses that are dynamically sourced from configurable modules.&lt;/p>
&lt;p>Unlike static IP matching, this module enables real-time IP range updates through pluggable IPRangeSource implementations. This is useful for scenarios requiring dynamic access control based on changing IP ranges, such as cloud provider IP lists or threat intelligence feeds.&lt;/p>
</content:encoded></item><item><title>TOOR.sh</title><link>https://lanrat.com/projects/toor.sh/</link><pubDate>Wed, 17 May 2023 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/toor.sh/</guid><description>&lt;p&gt;TOOR.sh is a cloud and VM hosting service operated by ToorCon, a 501c3 non-profit organization that provides free hosting resources for security research and public benefit projects. The service includes dedicated servers for VMs, storage, and databases, along with their own ISP infrastructure (AS22296).&lt;/p&gt;
&lt;p&gt;The platform offers various free tools including IP address lookup services, network speed tests, and internet infrastructure services such as RIPE Atlas probes, BGP feeds, Tor nodes, and Signal TLS proxies. TOOR.sh operates on a volunteer basis with a &amp;ldquo;best effort SLA&amp;rdquo; and accepts donations of hardware, network resources, or funds to support their mission.&lt;/p&gt;</description><content:encoded><![CDATA[<p>TOOR.sh is a cloud and VM hosting service operated by ToorCon, a 501c3 non-profit organization that provides free hosting resources for security research and public benefit projects. The service includes dedicated servers for VMs, storage, and databases, along with their own ISP infrastructure (AS22296).</p>
<p>The platform offers various free tools including IP address lookup services, network speed tests, and internet infrastructure services such as RIPE Atlas probes, BGP feeds, Tor nodes, and Signal TLS proxies. TOOR.sh operates on a volunteer basis with a &ldquo;best effort SLA&rdquo; and accepts donations of hardware, network resources, or funds to support their mission.</p>
]]></content:encoded></item><item><title>WebSerial Bruteforce</title><link>https://lanrat.com/projects/webserial-bruteforce/</link><pubDate>Thu, 22 Sep 2022 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/webserial-bruteforce/</guid><description>&lt;p&gt;WebSerial Bruteforce automatically determines the correct baud rate for UART serial devices by testing common communication speeds and analyzing the returned data. The web application uses the WebSerial API to connect directly to serial devices from the browser without requiring additional software.&lt;/p&gt;
&lt;p&gt;The tool iterates through standard baud rates and measures the amount of ASCII data returned at each setting, selecting the configuration that produces the most readable output. This is useful for reverse engineering or troubleshooting unknown serial devices where the communication parameters are not documented.&lt;/p&gt;</description><content:encoded>&lt;p>WebSerial Bruteforce automatically determines the correct baud rate for UART serial devices by testing common communication speeds and analyzing the returned data. The web application uses the WebSerial API to connect directly to serial devices from the browser without requiring additional software.&lt;/p>
&lt;p>The tool iterates through standard baud rates and measures the amount of ASCII data returned at each setting, selecting the configuration that produces the most readable output. This is useful for reverse engineering or troubleshooting unknown serial devices where the communication parameters are not documented.&lt;/p>
</content:encoded></item><item><title>USB Meter</title><link>https://lanrat.com/projects/usb-meter/</link><pubDate>Tue, 20 Sep 2022 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/usb-meter/</guid><description>&lt;p&gt;USB Meter is a web application that connects to Atorch power meters via WebBluetooth to log and display electrical measurements. The application reads real-time data including voltage, current, power, energy, capacity, resistance, and temperature from compatible Atorch USB power meters.&lt;/p&gt;
&lt;p&gt;The web interface provides data logging capabilities with the ability to reset, pause, and save measurement sessions. Using WebBluetooth API, the application eliminates the need for additional software installations, operating directly in compatible web browsers with Bluetooth support.&lt;/p&gt;</description><content:encoded>&lt;p>USB Meter is a web application that connects to Atorch power meters via WebBluetooth to log and display electrical measurements. The application reads real-time data including voltage, current, power, energy, capacity, resistance, and temperature from compatible Atorch USB power meters.&lt;/p>
&lt;p>The web interface provides data logging capabilities with the ability to reset, pause, and save measurement sessions. Using WebBluetooth API, the application eliminates the need for additional software installations, operating directly in compatible web browsers with Bluetooth support.&lt;/p>
</content:encoded></item><item><title>OpenWrt Tailscale Repository</title><link>https://lanrat.com/projects/openwrt-tailscale-repository/</link><pubDate>Thu, 08 Sep 2022 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/openwrt-tailscale-repository/</guid><description>&lt;p&gt;An opkg repository that builds Tailscale combined packages for OpenWrt devices, specifically providing a backport of Tailscale for OpenWrt 19.07. The project addresses the lack of official Tailscale packages for older OpenWrt versions by providing a flexible build system that generates installable packages across multiple hardware architectures.&lt;/p&gt;
&lt;p&gt;The repository includes automated build scripts that create opkg feed and package files, allowing users to easily install and configure Tailscale on their OpenWrt 19.07 devices. This enables secure mesh networking capabilities on legacy router firmware, making it simple to connect older OpenWrt devices to a Tailscale network for remote access and site-to-site connectivity.&lt;/p&gt;</description><content:encoded>&lt;p>An opkg repository that builds Tailscale combined packages for OpenWrt devices, specifically providing a backport of Tailscale for OpenWrt 19.07. The project addresses the lack of official Tailscale packages for older OpenWrt versions by providing a flexible build system that generates installable packages across multiple hardware architectures.&lt;/p>
&lt;p>The repository includes automated build scripts that create opkg feed and package files, allowing users to easily install and configure Tailscale on their OpenWrt 19.07 devices. This enables secure mesh networking capabilities on legacy router firmware, making it simple to connect older OpenWrt devices to a Tailscale network for remote access and site-to-site connectivity.&lt;/p>
</content:encoded></item><item><title>Mag Encode</title><link>https://lanrat.com/projects/mag-encode/</link><pubDate>Wed, 03 Aug 2022 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/mag-encode/</guid><description>&lt;p&gt;Mag Encode is a web-based magnetic stripe card encoder that generates audio signals for encoding data onto magnetic stripe cards. The application runs entirely in the browser, processing encoding operations client-side without transmitting data to external servers.&lt;/p&gt;
&lt;p&gt;The tool supports configurable encoding parameters including frequency settings, reverse swipe options, and various advanced configuration options for different magnetic stripe formats. It converts digital data into the appropriate audio waveforms that can be played through audio output devices to magnetically encode stripe cards.&lt;/p&gt;</description><content:encoded>&lt;p>Mag Encode is a web-based magnetic stripe card encoder that generates audio signals for encoding data onto magnetic stripe cards. The application runs entirely in the browser, processing encoding operations client-side without transmitting data to external servers.&lt;/p>
&lt;p>The tool supports configurable encoding parameters including frequency settings, reverse swipe options, and various advanced configuration options for different magnetic stripe formats. It converts digital data into the appropriate audio waveforms that can be played through audio output devices to magnetically encode stripe cards.&lt;/p>
</content:encoded></item><item><title>Broken DNS</title><link>https://lanrat.com/projects/broken-dns/</link><pubDate>Wed, 08 Jun 2022 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/broken-dns/</guid><description>&lt;p&gt;Broken DNS performs lame delegation checking at scale to identify DNS nameserver configuration issues. The tool validates DNS delegation by checking if nameservers properly respond to queries for zones they are supposed to be authoritative for.&lt;/p&gt;
&lt;p&gt;The Go implementation can process large numbers of domains and nameservers to detect misconfigurations where nameservers are listed in delegation records but do not actually serve the zone data. This helps identify broken DNS setups that can cause resolution failures.&lt;/p&gt;</description><content:encoded>&lt;p>Broken DNS performs lame delegation checking at scale to identify DNS nameserver configuration issues. The tool validates DNS delegation by checking if nameservers properly respond to queries for zones they are supposed to be authoritative for.&lt;/p>
&lt;p>The Go implementation can process large numbers of domains and nameservers to detect misconfigurations where nameservers are listed in delegation records but do not actually serve the zone data. This helps identify broken DNS setups that can cause resolution failures.&lt;/p>
</content:encoded></item><item><title>Minimalin Reborn</title><link>https://lanrat.com/projects/minimalin-reborn/</link><pubDate>Sun, 27 Mar 2022 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/minimalin-reborn/</guid><description>&lt;p&gt;Minimalin Reborn is a minimalistic watchface for Pebble smartwatches, featuring a clean design with customizable colors and optional information displays. The watchface uses a custom font called Nupe and provides configurable elements including weather data and step tracking integration.&lt;/p&gt;
&lt;p&gt;This project is a fork and modernization of the original minimalin watchface, updated to work with current Pebble development tools and the Rebble ecosystem. The watchface supports both color and monochrome Pebble devices with adaptive styling and user-configurable display options.&lt;/p&gt;</description><content:encoded>&lt;p>Minimalin Reborn is a minimalistic watchface for Pebble smartwatches, featuring a clean design with customizable colors and optional information displays. The watchface uses a custom font called Nupe and provides configurable elements including weather data and step tracking integration.&lt;/p>
&lt;p>This project is a fork and modernization of the original minimalin watchface, updated to work with current Pebble development tools and the Rebble ecosystem. The watchface supports both color and monochrome Pebble devices with adaptive styling and user-configurable display options.&lt;/p>
</content:encoded></item><item><title>Homeplate</title><link>https://lanrat.com/projects/homeplate/</link><pubDate>Sat, 22 Jan 2022 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/homeplate/</guid><description>&lt;p&gt;Homeplate is an ESP32-based e-ink dashboard that displays data from Trmnl and Home Assistant on an Inkplate 10 device. The firmware fetches and renders various dashboard widgets including sensor readings, WiFi QR codes, and system status information.&lt;/p&gt;
&lt;p&gt;The implementation uses FreeRTOS on ESP32 to manage display updates, network connectivity, and power management for the e-ink display. It supports multiple data sources and configurable display layouts for home automation monitoring.&lt;/p&gt;</description><content:encoded>&lt;p>Homeplate is an ESP32-based e-ink dashboard that displays data from Trmnl and Home Assistant on an Inkplate 10 device. The firmware fetches and renders various dashboard widgets including sensor readings, WiFi QR codes, and system status information.&lt;/p>
&lt;p>The implementation uses FreeRTOS on ESP32 to manage display updates, network connectivity, and power management for the e-ink display. It supports multiple data sources and configurable display layouts for home automation monitoring.&lt;/p>
</content:encoded></item><item><title>ESPHome Components</title><link>https://lanrat.com/projects/esphome-components/</link><pubDate>Mon, 04 Oct 2021 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/esphome-components/</guid><description>&lt;p&gt;ESPHome Components is a collection of custom components that extend ESPHome functionality for ESP8266 and ESP32 microcontrollers. The repository contains C++ implementations of additional sensors, displays, and device integrations not available in the core ESPHome distribution.&lt;/p&gt;
&lt;p&gt;The components follow ESPHome&amp;rsquo;s standard architecture and configuration patterns, allowing them to be easily integrated into existing ESPHome projects through external component references. Each component includes the necessary C++ code and Python configuration validation.&lt;/p&gt;</description><content:encoded><![CDATA[<p>ESPHome Components is a collection of custom components that extend ESPHome functionality for ESP8266 and ESP32 microcontrollers. The repository contains C++ implementations of additional sensors, displays, and device integrations not available in the core ESPHome distribution.</p>
<p>The components follow ESPHome&rsquo;s standard architecture and configuration patterns, allowing them to be easily integrated into existing ESPHome projects through external component references. Each component includes the necessary C++ code and Python configuration validation.</p>
]]></content:encoded></item><item><title>DNS2mDNS</title><link>https://lanrat.com/projects/dns2mdns/</link><pubDate>Mon, 26 Apr 2021 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/dns2mdns/</guid><description>&lt;p&gt;DNS2mDNS bridges traditional DNS queries with multicast DNS (mDNS) resolution for .local hostnames. The service allows devices that don&amp;rsquo;t natively support mDNS, such as many Android devices and Windows systems, to resolve local network hostnames through standard DNS queries.&lt;/p&gt;
&lt;p&gt;The Go implementation acts as a DNS server that intercepts queries for .local domains and forwards them to the mDNS system, then returns the results via standard DNS responses. This enables seamless local hostname resolution across mixed network environments with Docker deployment support.&lt;/p&gt;</description><content:encoded><![CDATA[<p>DNS2mDNS bridges traditional DNS queries with multicast DNS (mDNS) resolution for .local hostnames. The service allows devices that don&rsquo;t natively support mDNS, such as many Android devices and Windows systems, to resolve local network hostnames through standard DNS queries.</p>
<p>The Go implementation acts as a DNS server that intercepts queries for .local domains and forwards them to the mDNS system, then returns the results via standard DNS responses. This enables seamless local hostname resolution across mixed network environments with Docker deployment support.</p>
]]></content:encoded></item><item><title>Luxer One</title><link>https://lanrat.com/projects/luxer-one/</link><pubDate>Sun, 21 Feb 2021 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/luxer-one/</guid><description>&lt;p&gt;Luxer One is a Python API client for the Luxer One Residential package management system. The library provides programmatic access to check package delivery status, retrieve pending packages, and interact with smart locker systems commonly found in apartment complexes and residential buildings.&lt;/p&gt;
&lt;p&gt;The client handles authentication with the Luxer One API and includes example code demonstrating basic operations such as logging in and querying package information. This enables automated monitoring and management of package deliveries through the Luxer One platform.&lt;/p&gt;</description><content:encoded>&lt;p>Luxer One is a Python API client for the Luxer One Residential package management system. The library provides programmatic access to check package delivery status, retrieve pending packages, and interact with smart locker systems commonly found in apartment complexes and residential buildings.&lt;/p>
&lt;p>The client handles authentication with the Luxer One API and includes example code demonstrating basic operations such as logging in and querying package information. This enables automated monitoring and management of package deliveries through the Luxer One platform.&lt;/p>
</content:encoded></item><item><title>Extsort</title><link>https://lanrat.com/projects/extsort/</link><pubDate>Wed, 25 Mar 2020 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/extsort/</guid><description>&lt;p&gt;Extsort is a Go library that implements external sorting algorithms for datasets larger than available memory. The library manages temporary files and memory buffers to sort data that cannot fit entirely in RAM.&lt;/p&gt;
&lt;p&gt;The implementation uses merge sort with configurable buffer sizes and temporary file management. It provides a standard Go interface for sorting operations while automatically handling the complexity of disk-based intermediate storage and merging phases.&lt;/p&gt;</description><content:encoded>&lt;p>Extsort is a Go library that implements external sorting algorithms for datasets larger than available memory. The library manages temporary files and memory buffers to sort data that cannot fit entirely in RAM.&lt;/p>
&lt;p>The implementation uses merge sort with configurable buffer sizes and temporary file management. It provides a standard Go interface for sorting operations while automatically handling the complexity of disk-based intermediate storage and merging phases.&lt;/p>
</content:encoded></item><item><title>Allxfr</title><link>https://lanrat.com/projects/allxfr/</link><pubDate>Sat, 23 Nov 2019 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/allxfr/</guid><description>&lt;p&gt;Allxfr performs DNS zone transfers (AXFR) against nameservers to retrieve complete zone files. The tool systematically attempts zone transfers against root zone servers and other configured nameservers to discover available zone data.&lt;/p&gt;
&lt;p&gt;The program supports both IPv4 and IPv6 connections and includes options for parallel transfers, dry-run operations, and zone file storage. It implements the DNS AXFR protocol to request complete zone transfers from authoritative nameservers that permit such operations.&lt;/p&gt;</description><content:encoded>&lt;p>Allxfr performs DNS zone transfers (AXFR) against nameservers to retrieve complete zone files. The tool systematically attempts zone transfers against root zone servers and other configured nameservers to discover available zone data.&lt;/p>
&lt;p>The program supports both IPv4 and IPv6 connections and includes options for parallel transfers, dry-run operations, and zone file storage. It implements the DNS AXFR protocol to request complete zone transfers from authoritative nameservers that permit such operations.&lt;/p>
</content:encoded></item><item><title>Minimalin Watch Face</title><link>https://lanrat.com/projects/minimalin-watch-face/</link><pubDate>Mon, 10 Jun 2019 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/minimalin-watch-face/</guid><description>&lt;p&gt;Minimalin Watch Face is a minimalistic Wear OS watch face featuring clean typography and Material Design aesthetics. The watch face displays time with customizable complications and supports ambient mode for always-on displays with reduced power consumption.&lt;/p&gt;
&lt;p&gt;Inspired by the original &lt;a href="https://lanrat.com/projects/minimalin-reborn/"&gt;Pebble Minimalin watch face&lt;/a&gt;, this Wear OS implementation includes configurable color themes, center complications for additional information display, and optimized rendering for various screen sizes and densities across different smartwatch models.&lt;/p&gt;</description><content:encoded><![CDATA[<p>Minimalin Watch Face is a minimalistic Wear OS watch face featuring clean typography and Material Design aesthetics. The watch face displays time with customizable complications and supports ambient mode for always-on displays with reduced power consumption.</p>
<p>Inspired by the original <a href="/projects/minimalin-reborn/">Pebble Minimalin watch face</a>, this Wear OS implementation includes configurable color themes, center complications for additional information display, and optimized rendering for various screen sizes and densities across different smartwatch models.</p>
]]></content:encoded></item><item><title>M365 Toolbox</title><link>https://lanrat.com/projects/m365-toolbox/</link><pubDate>Tue, 14 May 2019 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/m365-toolbox/</guid><description>&lt;p&gt;M365 Toolbox demonstrates a security vulnerability in the Xiaomi M365 electric scooter&amp;rsquo;s communication protocol. The Java application exploits weaknesses in the scooter&amp;rsquo;s Bluetooth Low Energy (BLE) authentication mechanism to bypass security controls and execute unauthorized commands.&lt;/p&gt;
&lt;p&gt;The proof-of-concept tool reveals how the scooter&amp;rsquo;s authentication can be circumvented through protocol manipulation, allowing remote control access without proper authorization. This research highlighted critical security flaws in IoT device communication protocols commonly found in consumer transportation devices.&lt;/p&gt;</description><content:encoded><![CDATA[<p>M365 Toolbox demonstrates a security vulnerability in the Xiaomi M365 electric scooter&rsquo;s communication protocol. The Java application exploits weaknesses in the scooter&rsquo;s Bluetooth Low Energy (BLE) authentication mechanism to bypass security controls and execute unauthorized commands.</p>
<p>The proof-of-concept tool reveals how the scooter&rsquo;s authentication can be circumvented through protocol manipulation, allowing remote control access without proper authorization. This research highlighted critical security flaws in IoT device communication protocols commonly found in consumer transportation devices.</p>
]]></content:encoded></item><item><title>Stargate</title><link>https://lanrat.com/projects/stargate/</link><pubDate>Wed, 20 Mar 2019 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/stargate/</guid><description>&lt;p&gt;A Go library and SOCKS5 proxy server that enables egress traffic from multiple IP addresses within a subnet. Stargate randomly distributes network connections across different IP addresses to avoid rate-limiting and provide load balancing across available IP ranges.&lt;/p&gt;
&lt;p&gt;The tool works best with subnets directly routed to the host and is particularly powerful for IPv6 subnet utilization. It supports both TCP CONNECT and UDP ASSOCIATE protocols and provides both a standalone proxy tool and a Go library for programmatic random IP networking. Requires specific network routing configuration and primarily supports Linux and FreeBSD platforms due to freebind networking capabilities.&lt;/p&gt;</description><content:encoded>&lt;p>A Go library and SOCKS5 proxy server that enables egress traffic from multiple IP addresses within a subnet. Stargate randomly distributes network connections across different IP addresses to avoid rate-limiting and provide load balancing across available IP ranges.&lt;/p>
&lt;p>The tool works best with subnets directly routed to the host and is particularly powerful for IPv6 subnet utilization. It supports both TCP CONNECT and UDP ASSOCIATE protocols and provides both a standalone proxy tool and a Go library for programmatic random IP networking. Requires specific network routing configuration and primarily supports Linux and FreeBSD platforms due to freebind networking capabilities.&lt;/p>
</content:encoded></item><item><title>Binary Analog Watch Face</title><link>https://lanrat.com/projects/binary-analog-watch-face/</link><pubDate>Sun, 13 Jan 2019 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/binary-analog-watch-face/</guid><description>&lt;p&gt;Binary Analog Watch Face is an Android Wear watch face that combines analog time display with binary representation. The watch face uses binary digits to form the hour and minute hands, creating a unique visualization where time is displayed both analogically and in binary format.&lt;/p&gt;
&lt;p&gt;The watch face features Material Design aesthetics with customizable color themes and optional center complications. The implementation renders traditional analog clock hands using sequences of binary digits, inspired by Anthony Liekens&amp;rsquo;s Analog Binary Wall Clock concept.&lt;/p&gt;</description><content:encoded><![CDATA[<p>Binary Analog Watch Face is an Android Wear watch face that combines analog time display with binary representation. The watch face uses binary digits to form the hour and minute hands, creating a unique visualization where time is displayed both analogically and in binary format.</p>
<p>The watch face features Material Design aesthetics with customizable color themes and optional center complications. The implementation renders traditional analog clock hands using sequences of binary digits, inspired by Anthony Liekens&rsquo;s Analog Binary Wall Clock concept.</p>
]]></content:encoded></item><item><title>CZDS</title><link>https://lanrat.com/projects/czds/</link><pubDate>Sun, 29 Jul 2018 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/czds/</guid><description>&lt;p&gt;CZDS is a Go library and CLI tool for interacting with ICANN&amp;rsquo;s Centralized Zone Data Service API. It handles authentication, zone file downloads, request submissions, and status monitoring for accessing top-level domain zone data.&lt;/p&gt;
&lt;p&gt;The implementation supports parallel downloads, request management, and provides both library interfaces for Go applications and standalone command-line functionality. The tool automates the process of requesting and retrieving DNS zone files from ICANN&amp;rsquo;s centralized service.&lt;/p&gt;</description><content:encoded><![CDATA[<p>CZDS is a Go library and CLI tool for interacting with ICANN&rsquo;s Centralized Zone Data Service API. It handles authentication, zone file downloads, request submissions, and status monitoring for accessing top-level domain zone data.</p>
<p>The implementation supports parallel downloads, request management, and provides both library interfaces for Go applications and standalone command-line functionality. The tool automates the process of requesting and retrieving DNS zone files from ICANN&rsquo;s centralized service.</p>
]]></content:encoded></item><item><title>Tethr</title><link>https://lanrat.com/projects/tethr/</link><pubDate>Tue, 26 Dec 2017 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/tethr/</guid><description>&lt;p&gt;Tethr is an Android application that demonstrates CVE-2017-0554, a vulnerability that allows bypassing carrier tethering provisioning checks on unrooted devices. The proof-of-concept app exploits system property manipulation to enable mobile hotspot functionality without carrier approval.&lt;/p&gt;
&lt;p&gt;The vulnerability affects Android versions prior to 7.1.2 by allowing modification of tethering-related system properties through reflection and system service manipulation. This research was conducted to highlight security weaknesses in Android&amp;rsquo;s tethering permission model.&lt;/p&gt;</description><content:encoded><![CDATA[<p>Tethr is an Android application that demonstrates CVE-2017-0554, a vulnerability that allows bypassing carrier tethering provisioning checks on unrooted devices. The proof-of-concept app exploits system property manipulation to enable mobile hotspot functionality without carrier approval.</p>
<p>The vulnerability affects Android versions prior to 7.1.2 by allowing modification of tethering-related system properties through reflection and system service manipulation. This research was conducted to highlight security weaknesses in Android&rsquo;s tethering permission model.</p>
]]></content:encoded></item><item><title>CertGraph</title><link>https://lanrat.com/projects/certgraph/</link><pubDate>Tue, 30 Aug 2016 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/certgraph/</guid><description>&lt;p&gt;CertGraph crawls SSL certificates to map domain relationships through certificate alternate names. The tool builds a directed graph where domains are nodes and certificate alternative names create edges between related domains.&lt;/p&gt;
&lt;p&gt;The program performs hostname enumeration by following certificate relationships, revealing domain connections that may not be apparent through traditional DNS enumeration. It outputs data in various formats including graphical representations for network topology analysis.&lt;/p&gt;</description><content:encoded>&lt;p>CertGraph crawls SSL certificates to map domain relationships through certificate alternate names. The tool builds a directed graph where domains are nodes and certificate alternative names create edges between related domains.&lt;/p>
&lt;p>The program performs hostname enumeration by following certificate relationships, revealing domain connections that may not be apparent through traditional DNS enumeration. It outputs data in various formats including graphical representations for network topology analysis.&lt;/p>
</content:encoded></item><item><title>ImageTragick</title><link>https://lanrat.com/projects/imagetragick/</link><pubDate>Tue, 03 May 2016 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/imagetragick/</guid><description>&lt;p&gt;A collection of proof-of-concept exploits demonstrating critical vulnerabilities in ImageMagick (CVE-2016-3714 through CVE-2016-3717). These vulnerabilities allow remote code execution, server-side request forgery, file deletion, and local file disclosure through maliciously crafted image files.&lt;/p&gt;
&lt;p&gt;The project provides test scripts and example payloads to help developers and security researchers understand the attack vectors and implement proper mitigations. The vulnerabilities affect web applications using ImageMagick or related libraries for image processing, making this a significant security concern for many web services.&lt;/p&gt;</description><content:encoded>&lt;p>A collection of proof-of-concept exploits demonstrating critical vulnerabilities in ImageMagick (CVE-2016-3714 through CVE-2016-3717). These vulnerabilities allow remote code execution, server-side request forgery, file deletion, and local file disclosure through maliciously crafted image files.&lt;/p>
&lt;p>The project provides test scripts and example payloads to help developers and security researchers understand the attack vectors and implement proper mitigations. The vulnerabilities affect web applications using ImageMagick or related libraries for image processing, making this a significant security concern for many web services.&lt;/p>
</content:encoded></item><item><title>WiFi Recovery</title><link>https://lanrat.com/projects/wifi-recovery/</link><pubDate>Mon, 06 May 2013 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/wifi-recovery/</guid><description>&lt;p&gt;WiFi Recovery is an Android application that retrieves saved WiFi passwords from the device&amp;rsquo;s system files. The app requires root access to read the wpa_supplicant.conf file where Android stores network credentials in plain text format.&lt;/p&gt;
&lt;p&gt;The application uses libraries including ActionBarSherlock, ZXING for QR code generation, and RootTools for system-level file access. It provides a simple interface to view saved network passwords and can generate QR codes for easy network sharing. The project has been archived as modern Android versions have changed WiFi credential storage mechanisms.&lt;/p&gt;</description><content:encoded><![CDATA[<p>WiFi Recovery is an Android application that retrieves saved WiFi passwords from the device&rsquo;s system files. The app requires root access to read the wpa_supplicant.conf file where Android stores network credentials in plain text format.</p>
<p>The application uses libraries including ActionBarSherlock, ZXING for QR code generation, and RootTools for system-level file access. It provides a simple interface to view saved network passwords and can generate QR codes for easy network sharing. The project has been archived as modern Android versions have changed WiFi credential storage mechanisms.</p>
]]></content:encoded></item><item><title>DNS.coffee</title><link>https://lanrat.com/projects/dns.coffee/</link><pubDate>Mon, 11 Apr 2011 00:00:00 +0000</pubDate><guid>https://lanrat.com/projects/dns.coffee/</guid><description>&lt;p&gt;DNS.coffee is a web platform that collects and archives DNS zone file statistics to provide insights into DNS growth and changes over time. The service tracks domain distribution across zones, TLD root zone growth patterns, and overall internet domain expansion through comprehensive data visualization.&lt;/p&gt;
&lt;p&gt;The platform includes tools for domain record searches, nameserver lookups, IP information queries, and advanced search capabilities. DNS.coffee also provides an API for programmatic access to DNS data, making it a valuable resource for researchers and network administrators analyzing DNS infrastructure trends and domain name system evolution.&lt;/p&gt;</description><content:encoded>&lt;p>DNS.coffee is a web platform that collects and archives DNS zone file statistics to provide insights into DNS growth and changes over time. The service tracks domain distribution across zones, TLD root zone growth patterns, and overall internet domain expansion through comprehensive data visualization.&lt;/p>
&lt;p>The platform includes tools for domain record searches, nameserver lookups, IP information queries, and advanced search capabilities. DNS.coffee also provides an API for programmatic access to DNS data, making it a valuable resource for researchers and network administrators analyzing DNS infrastructure trends and domain name system evolution.&lt;/p>
</content:encoded></item></channel></rss>