ClusterM / wg-obfuscator
WireGuard obfuscator - simple obfuscator for WireGuard. Usefull if your ISP/government blocks WireGuard traffic.
☆121Updated 3 weeks ago
Alternatives and similar repositories for wg-obfuscator:
Users that are interested in wg-obfuscator are comparing it to the libraries listed below
- Modern web-based distributed hashcracking solution, built on hashcat☆114Updated last week
- Secure TLS tunnel with pool of prepared upstream connections☆95Updated last month
- Mirror only. Official repository is at https://git.zx2c4.com/wireguard-linux-compat☆159Updated 3 years ago
- Linux shared object injector written in pure C☆48Updated 2 weeks ago
- ☆67Updated 3 weeks ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆110Updated 6 months ago
- Local encrypt and decrypt telegram messages using secret keys.☆27Updated 3 months ago
- AmneziaWG for Windows☆69Updated 8 months ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆136Updated this week
- Tools for configuring Amnezia-WG☆114Updated 3 months ago
- Decoy handshake for Wireguard☆37Updated last year
- Iptables WireGuard obfuscation extension☆253Updated 3 weeks ago
- Reverse Shell - technique is commonly used in cyber attacks☆15Updated 10 months ago
- AmneziaWG VPN protocol☆709Updated 6 months ago
- Это вам не балалайка, получается☆21Updated last month
- SKUF Network Boot System allows you to boot diskless Arch Linux using SAMBA (no PXE required)☆140Updated 3 months ago
- Automated Hardening Framework for Ubuntu☆112Updated 9 months ago
- Tor Relay availability checker, for using it as a bridge in countries with censorship☆383Updated last month
- Payload for jpg file☆62Updated 5 months ago
- Antivirus Signature Search Toolkit☆78Updated last year
- Useful collection of scapy-scripts and more☆26Updated 7 months ago
- Ru-WireGuard: WireGuard protocol with GOST crypto algorithms☆26Updated 4 years ago
- AntiBlock program proxies DNS requests. The IP addresses of the specified domains are added to the routing table for routing through the …☆51Updated 2 weeks ago
- Введение в реверсинг с нуля, используя IDA PRO. Перевод от Яши☆102Updated 3 years ago
- ☆10Updated 5 months ago
- The baker for E5785 custom router firmware☆15Updated 4 years ago
- VPN☆80Updated this week
- ☆15Updated 9 months ago
- 🧸 fully isolated honeypot ssh server using thrussh☆264Updated 2 months ago
- Proof-of-Concept найденной уязвимости в телеграме. Телеграм бот для отслеживания переходов по ссылке.☆24Updated 6 months ago