danoctavian / bit-smugglerView external linksLinks
tunnel traffic through a genuine bittorrent connection
☆66Sep 30, 2019Updated 6 years ago
Alternatives and similar repositories for bit-smuggler
Users that are interested in bit-smuggler are comparing it to the libraries listed below
Sorting:
- Haskell API for I2P anonymous networking☆16Jun 1, 2015Updated 10 years ago
- Secure multiparty messaging (kindof)☆21Jun 2, 2016Updated 9 years ago
- Robust persistence for typed immutable data☆16Nov 5, 2016Updated 9 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 10 years ago
- being the notes and materials for CS410 in the 2013/14 academic session☆30May 27, 2014Updated 11 years ago
- Typed DSLs for sorting☆20Feb 16, 2018Updated 7 years ago
- Mix Network Bibliography☆15Feb 6, 2020Updated 6 years ago
- serverless, encrypted, NAT-breaking p2p connections - DEPRECATED☆265Sep 1, 2020Updated 5 years ago
- random hacks☆16Jan 4, 2018Updated 8 years ago
- misc stuff☆19Jun 1, 2017Updated 8 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 3 years ago
- GNUnet in Go☆20Jul 20, 2023Updated 2 years ago
- A Haskell library for generating Ruby consumers of Servant APIs.☆23Jan 14, 2026Updated last month
- Companion code for "Why Dependent Types Matter" paper.☆60Jun 14, 2018Updated 7 years ago
- A file-based IRC client inspired by ii☆40Aug 3, 2025Updated 6 months ago
- I2P Daemon written in Rust☆14Apr 7, 2017Updated 8 years ago
- An emacs major mode for editing hamlet, lucius, and julius files☆36Jul 4, 2018Updated 7 years ago
- Lightweight Haskell dynamic loading library originally written by Copyright © 2004 Hampus Ram.☆24Feb 28, 2018Updated 7 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- An exploration and implementation of the lambda calculus.☆12Oct 18, 2016Updated 9 years ago
- An auto-configuring reverse DNS name server☆11Nov 2, 2025Updated 3 months ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- The Dirty Pipe Vulnerability☆46Mar 8, 2022Updated 3 years ago
- A general-purpose privacy-preserving Analytics platform!☆10Mar 27, 2019Updated 6 years ago
- A pure-go implementation of the Axolotl Ratchet, extracted from pond☆21Feb 8, 2017Updated 9 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- Experiments with effect systems☆12Apr 18, 2016Updated 9 years ago
- ☆11Nov 5, 2015Updated 10 years ago
- ☆11May 26, 2021Updated 4 years ago
- A Computer Algebra System written in and for Haskell☆26Jul 10, 2016Updated 9 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Sep 21, 2020Updated 5 years ago
- Elixir/Erlang interop for ccxt library☆12Apr 1, 2019Updated 6 years ago
- A small, efficient and portable regex library for Perl 5 compatible regular expressions☆15Sep 12, 2023Updated 2 years ago
- An end to end encrypted Messenger that uses the signal protocol over the I2P network☆12Jun 26, 2023Updated 2 years ago
- your accounts balance from multiple cryptocurency exchanges. Free, open source☆12Apr 18, 2017Updated 8 years ago
- Heroku + docker + haskell = ?☆13May 11, 2015Updated 10 years ago
- ☆36Mar 2, 2022Updated 3 years ago
- Syndie is an open source system for operating distributed forums, offering a secure and consistent interface to various anonymous and non…☆40Jul 17, 2025Updated 6 months ago