WireGuard Obfuscator - simple obfuscator for WireGuard. Useful if your ISP/government blocks WireGuard traffic.
☆688Apr 2, 2026Updated last month
Alternatives and similar repositories for wg-obfuscator
Users that are interested in wg-obfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 31, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- Small micro-coded RISC-V softcore☆15Nov 27, 2018Updated 7 years ago
- Payload encoding utility to effectively lower payload entropy.☆129Apr 15, 2025Updated last year
- ☆19Oct 14, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Wiki pages for compiler technologies https://compilers.wiki☆24Mar 19, 2023Updated 3 years ago
- dnstt project gives you this power to tunnel over UDP-DNS/DOH/DOT. A mirror to https://www.bamsoftware.com/software/dnstt/☆26Jun 23, 2025Updated 10 months ago
- Collection of Cheat dumps for Research and Detection.☆16Jan 4, 2026Updated 4 months ago
- Pure Go GOST Cryptographic Functions Library☆13Jan 17, 2025Updated last year
- Using Windows' own bootloader as a shim to bypass Secure Boot☆236Jul 17, 2024Updated last year
- RE for champions☆15Updated this week
- Android Telephony, RIL, Radio of Modem module☆26Mar 1, 2022Updated 4 years ago
- llvm powered deobfuscation of a vm-based protection☆56Feb 25, 2026Updated 2 months ago
- BINARLY Research Tools and PoCs☆39Sep 27, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Nuke It From Orbit - remove AV/EDR with physical access☆274Dec 8, 2024Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- Reverse SSH C2☆34Sep 19, 2025Updated 7 months ago
- ☆27Mar 6, 2025Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆56May 26, 2025Updated 11 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆95Jul 28, 2024Updated last year
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆39Jan 15, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 4 months ago
- Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnerability (CVE-2025-4275)☆41Jun 20, 2025Updated 10 months ago
- Workshop for Model Context Protocol☆17Mar 27, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- "Service-less" driver loading☆186Nov 28, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆341Feb 27, 2026Updated 2 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- RCE through a race condition in Apache Tomcat☆57Dec 21, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- A simple POC to expose Mythic as a MCP server☆74Mar 20, 2025Updated last year
- compile-time control flow obfuscation using mba☆199Jul 4, 2023Updated 2 years ago
- ☆90Nov 25, 2024Updated last year
- ast pattern matching with automated structure recovery for hex-rays decompiler☆34Apr 18, 2026Updated 2 weeks ago
- Lightweight PDB symbol parser and resolver☆30Oct 28, 2024Updated last year