
Product
Introducing Tier 1 Reachability: Precision CVE Triage for Enterprise Teams
Socket’s new Tier 1 Reachability filters out up to 80% of irrelevant CVEs, so security teams can focus on the vulnerabilities that matter.
EchoWarp is a versatile network audio streaming tool designed to transmit audio streams between a server and a client over a network. It supports both audio input and output devices, adapting to various audio streaming scenarios. EchoWarp can operate in either server or client mode, with robust configuration options available via command-line arguments or an interactive setup.
[WinError 10049]
timed out
403 Forbidden (Client is banned)
401 Unauthorized (Invalid password)
409 Conflict (Client version mismatch)
EchoWarp is also available as a package on the Python Package Index (PyPi), which simplifies the installation process and manages dependencies automatically. This is the recommended method if you wish to include EchoWarp in your Python project.
To install EchoWarp using pip, follow these steps:
python -m venv .venv
source .venv/bin/activate # On Windows, use `.\.venv\Scripts\activate`
pip install echowarp
To update to the latest version of EchoWarp, simply run:
pip install --upgrade echowarp
This ensures that you have the latest features and improvements.
For more information and assistance, you can visit the EchoWarp PyPi page: https://pypi.org/project/echowarp/
Clone the repository and set up a Python virtual environment:
git clone https://github.com/lHumaNl/EchoWarp.git
cd EchoWarp
python -m venv venv
source venv/bin/activate # On Windows, use `.\venv\Scripts\activate`
pip install -r requirements.txt
EchoWarp can be launched in either server or client mode, with settings configured interactively or via command-line arguments.
Simply run the main.py script without arguments to enter interactive mode:
python -m echowarp.main
Follow the on-screen prompts to configure the utility.
EchoWarp supports configuration via command-line arguments for easy integration into scripts and automation workflows.
Argument | Description | Default |
---|---|---|
-c , --client | Start utility in client mode (Mode in which the device receives an audio stream from the server over the network and plays it on the specified audio device). | Server mode (Mode in which the audio stream from the specified device is captured and sent to the client over the network) |
-o , --output | Use the output audio device for streaming (like speakers and headphones). | Input device (like microphones) |
-u , --udp_port | Specify the UDP\TCP port for audio data transmission\authorization. | 4415 |
-b , --socket_buffer_size | Size of socket buffer. | 6144 |
-d , --device_id | Specify the device ID directly to avoid interactive selection. | None |
-p , --password | Password for authentication. | None |
-f , --config_file | Path to config file (ignoring other args, if they added). | None |
-e , --device_encoding_names | Charset encoding for audio device. | System default encoding |
--ignore_device_encoding_names | Ignoring device names encoding. | False |
-l , --is_error_log | Write error log lines to file. | False |
-r , --reconnect | Number of failed connections (before closing the application in client mode\before ban client in server mode). (0=infinite) | 5 |
-s , --save_config | Save config file from selected args (ignoring default values). | None |
-a , --server_address | Specify the server address (only valid in client mode). | None |
--ssl | Enable SSL mode for encrypted communication (server mode only). | False |
-i , --integrity_control | Enable integrity control using hash (server mode only). | False |
-w , --workers | Set the maximum number of worker threads (server mode only). | 1 |
Use these arguments to configure the utility directly from the command line for both automation and manual setups.
You can launch EchoWarp using a configuration file to avoid specifying all the arguments manually. Create a configuration file with the desired settings and use the --config_file argument to specify the path to this file.
Example of a configuration file (config.conf):
[echowarp_conf]
is_server=False
udp_port=6532
socket_buffer_size=10240
device_id=1
password=mysecretpassword
device_encoding_names=cp1251
is_error_log=True
server_address=192.168.1.5
reconnect_attempt=15
is_ssl=True
is_integrity_control=True
To launch EchoWarp with the configuration file with CLI args:
python -m echowarp.main --config_file path/to/config.conf
EchoWarp server maintains a ban list to block clients after a specified number of failed connection attempts. This feature helps to secure the server from unauthorized access attempts and repeated failed authentications.
--reconnect
argument), the client is added to the ban list.
Setting --reconnect
to 0
in server mode disables the ban list feature.echowarp_ban_list.txt
) to maintain the list of banned
clients across server restarts.The ban list file (echowarp_ban_list.txt
) contains the IP addresses of banned clients, one per line:
192.168.1.100
192.168.1.101
python -m echowarp.main --help
python -m echowarp.main --client --server_address 192.168.1.5 --udp_port 6555
FAQs
Network audio streaming tool using UDP
We found that echowarp demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket’s new Tier 1 Reachability filters out up to 80% of irrelevant CVEs, so security teams can focus on the vulnerabilities that matter.
Research
/Security News
Ongoing npm supply chain attack spreads to DuckDB: multiple packages compromised with the same wallet-drainer malware.
Security News
The MCP Steering Committee has launched the official MCP Registry in preview, a central hub for discovering and publishing MCP servers.