chongyangshi / CovertMarkLinks
A deep packet inspection (DPI) framework for benchmarking the covertness of protocol-obfuscation proxies.
☆14Updated 3 years ago
Alternatives and similar repositories for CovertMark
Users that are interested in CovertMark are comparing it to the libraries listed below
Sorting:
- Protean is a collection of transformers designed for the purpose of obfuscating UDP network traffic☆16Updated 5 years ago
- Quic Pluggable Transport for Tor.☆16Updated 7 years ago
- Website for IPv6 Hitlist Service with data, software, paper of "Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists" IMC'1…☆35Updated 2 weeks ago
- tamper resistant audit log☆17Updated 7 years ago
- High performance Deep Packet Inspection (DPI) framework to identify L7 protocols and extract and process data and metadata from network t…☆130Updated 5 years ago
- DNS-over-QUIC to UDP Proxy☆75Updated last year
- Rust bindings to the Knot Resolver library (also known as libkres)☆18Updated 6 years ago
- Moved to https://codeberg.org/DNS-OARC/dnsjit☆61Updated last week
- A DNS library for Rust.☆23Updated 10 months ago
- Tiny nDPI based deep packet inspection daemons / toolkit.☆90Updated 2 months ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Entropy clustering of IPv6 networks, see https://ipv6hitlist.github.io/☆13Updated 7 years ago
- Bootstrapping secure communication without leaking metadata☆77Updated 6 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆20Updated 7 years ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- This is a repository to track issues and suggestions to the Pluggable Transports spec☆26Updated 4 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 4 years ago
- Shapeshifter Transports is a set of Pluggable Transports implementing the Go API from the Pluggable Transports 2.0 specification☆45Updated 2 years ago
- A high performance, pass-through TCP-proxy with delayed binding (~ 1 million cps with 3 cores)☆36Updated 2 years ago
- FPE - Format Preserving Encryption with FF3 in C☆14Updated 2 weeks ago
- Implementation of libsodium's secretstream in Go☆20Updated 3 weeks ago
- Forward/Reverse TCP traceroute using Linux NFQueue☆36Updated 6 years ago
- Modular proxy tunnel that encapsulates traffic within a cover protocol to circumvent censorship.☆120Updated 3 years ago
- oht is an onion routed (using the Tor network, similar in design to ricochet and onionshare) distributed hash table to be used as the bas…☆46Updated 7 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 8 years ago
- Pong revolution.☆16Updated 3 months ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- Longest Prefix Match (LPM) library☆46Updated 3 years ago
- ☆19Updated 5 years ago