AfonsoVilalonga / TorKameleon
A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels and K-anonymization.
☆11Updated 6 months ago
Alternatives and similar repositories for TorKameleon:
Users that are interested in TorKameleon are comparing it to the libraries listed below
- Obfuscate UDP traffic as RTP☆19Updated last year
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆15Updated last year
- A tiny Tor client implementation (written in C).☆15Updated 6 years ago
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆15Updated last year
- Shapeshifter Dispatcher converts Pluggable Transports that implement the Go API from the Pluggable Transports 2.1 specification into prox…☆178Updated 7 months ago
- Facial Recognition and its dangers for Special Forces Operatives☆24Updated last year
- Moonbounce is graphical user interface for using an OpenVPN client and server with Pluggable Transport support. The goal of Moonbounce is…☆29Updated 10 months ago
- Collection of osint related links original posted by Tr1gger on raidforums.com which Tr1gger had copied from the @i_intelligence handbook☆21Updated 6 years ago
- Terminal based fake identity generator.☆26Updated last year
- 🧮 SOCKS5/4/4a 🌾 validating proxy pool and upstream SOCKS5 server for 🤽 LOLXDsoRANDum connections 🎋☆78Updated 4 months ago
- Yet another TCP-over-HTTP(S) tunnel☆24Updated 2 years ago
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆22Updated 4 years ago
- Tunnel proxy to wrap OpenVPN TCP traffic in to websocket or regular TCP traffic as a means to bypass OpenVPN blocks.☆28Updated last month
- ☆10Updated 3 years ago
- ☆13Updated 6 months ago
- A tiny Tor client implementation (in pure python).☆133Updated last year
- Python bindings for hashcat☆32Updated 3 years ago
- Proteus: Programmable Protocols for Censorship Circumvention☆25Updated last year
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated last year
- ☆17Updated 2 weeks ago
- ☆13Updated 4 months ago
- FactCheckExplorer library provides an easy-to-use Python interface for querying and fetching fact-checking data from Google's Fact Check …☆13Updated 10 months ago
- This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily b…☆12Updated this week
- ☆9Updated 2 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated 7 months ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- The best vpn service 2022 Lifetime free anonymous Awesome dVPN foss Network decentralized Ethereum Blockchain DHT-VPN Peer-to-peer open-s…☆29Updated 2 years ago
- Emerald Onion's Encrypted DNS Resolver☆28Updated 2 years ago
- ☆80Updated last year
- List of NSO Pegasus's C2C Servers where will be used to control Pegasus.☆16Updated last year