NullHypothesis / brdgrdLinks
Protects Tor bridges from being scanned (and as a result blocked) by GFW probes.
☆227Updated 7 years ago
Alternatives and similar repositories for brdgrd
Users that are interested in brdgrd are comparing it to the libraries listed below
Sorting:
- Notebook demo V2Ray traffic classification by deep packet inspection☆164Updated 3 years ago
- Automatic Discrepancy Discovery for DPI Elusion☆256Updated 5 years ago
- A probe resistant proxy☆111Updated 4 years ago
- For general discussion over Project V development and usage.☆298Updated 5 years ago
- A simple tool that wraps HTTPS proxies into a SOCKS5 proxy.☆123Updated 6 years ago
- The best companion of kcptun☆243Updated 5 years ago
- Yet another SIP003 plugin based on IETF-QUIC☆133Updated 2 months ago
- anti-pollution DNS server☆290Updated 2 years ago
- dns2socks☆147Updated 3 years ago
- SIP003-compatible KCPTUN and UDP2RAW plugins for Shadowsocks☆51Updated 6 years ago
- A lightweight proxy client written in C, intends to support multiple protocols(trojan etc.)☆117Updated last year
- A Full Backup from https://github.com/chengr28/Pcap_DNSProxy☆142Updated 6 years ago
- Redirect attack on Shadowsocks stream ciphers☆396Updated 5 years ago
- Go implementation of XTLS protocol.☆296Updated 2 years ago
- Kcptun with raw socket and fake TCP headers.☆418Updated 7 years ago
- Deprecated. Please use v2ray-core for feature requests☆57Updated 8 years ago
- Toy gRPC Tunnel over CloudFlare (Proof of Concept)☆162Updated 3 years ago
- 将 iptables/nftables 传入的透明代理流量转为 socks5 流量的实用工具☆492Updated 2 months ago
- A kernel module to turn MASQUERADE into full cone SNAT☆447Updated 3 years ago
- multi-platform(cross-platform) version of udp2raw-tunnel, which supports Windows/Mac/BSD natively. Client-Only at the moment.☆691Updated 2 years ago
- 突破网络审查和封锁的开源工具清单。☆328Updated 3 years ago
- A web app managing shadowsocks users, servers, nodes, products, accounts, and traffic. Suitable for internal use by companies, organizati…☆136Updated 7 years ago
- TCP China congestion control algorithm☆105Updated 4 years ago
- A fast, secure and reliable VPN service based on non-standard protocol☆249Updated 2 years ago
- More Experimental Effective Features for Trojan☆88Updated 3 years ago
- Turn any pluggable transport for Tor into an obfuscating TCP tunnel.☆160Updated 2 years ago
- an extremely simple & fast udp tunnel based on kcp protocol☆466Updated 2 years ago
- Protect yourself against DNS poisoning in China.☆48Updated 5 years ago
- ☆376Updated last week
- A multi-connection TCP forwarder/accelerator☆502Updated 2 years ago