WireGuard Obfuscator - simple obfuscator for WireGuard. Useful if your ISP/government blocks WireGuard traffic.
☆621Apr 2, 2026Updated last week
Alternatives and similar repositories for wg-obfuscator
Users that are interested in wg-obfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 31, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- Small micro-coded RISC-V softcore☆15Nov 27, 2018Updated 7 years ago
- dnstt project gives you this power to tunnel over UDP-DNS/DOH/DOT. A mirror to https://www.bamsoftware.com/software/dnstt/☆25Jun 23, 2025Updated 9 months ago
- Payload encoding utility to effectively lower payload entropy.☆126Apr 15, 2025Updated 11 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆20Oct 14, 2024Updated last year
- Wiki pages for compiler technologies https://compilers.wiki☆24Mar 19, 2023Updated 3 years ago
- Collection of Cheat dumps for Research and Detection.☆16Jan 4, 2026Updated 3 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆232Jul 17, 2024Updated last year
- Pure Go GOST Cryptographic Functions Library☆13Jan 17, 2025Updated last year
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- RE for champions☆15Updated this week
- Android Telephony, RIL, Radio of Modem module☆26Mar 1, 2022Updated 4 years ago
- llvm powered deobfuscation of a vm-based protection☆54Feb 25, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- BINARLY Research Tools and PoCs☆39Sep 27, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Nuke It From Orbit - remove AV/EDR with physical access☆274Dec 8, 2024Updated last year
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- Reverse SSH C2☆34Sep 19, 2025Updated 6 months ago
- ☆27Mar 6, 2025Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆56May 26, 2025Updated 10 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆93Jul 28, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆38Jan 15, 2024Updated 2 years ago
- Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnerability (CVE-2025-4275)☆41Jun 20, 2025Updated 9 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 3 months ago
- Workshop for Model Context Protocol☆17Mar 27, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆338Feb 27, 2026Updated last month
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- RCE through a race condition in Apache Tomcat☆57Dec 21, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 6 months ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated last year
- compile-time control flow obfuscation using mba☆199Jul 4, 2023Updated 2 years ago
- ☆90Nov 25, 2024Updated last year
- Lightweight PDB symbol parser and resolver☆30Oct 28, 2024Updated last year