hack3ric / mimicLinks
eBPF UDP -> TCP obfuscator
☆189Updated 2 months ago
Alternatives and similar repositories for mimic
Users that are interested in mimic are comparing it to the libraries listed below
Sorting:
- An eBPF-based Endpoint-Independent(Full Cone) NAT for Linux☆254Updated last month
- Multiprotocol IP Switching (MPIS)☆25Updated 2 years ago
- A BGP speaker that feeds all China IPv4 delegations to peer.☆33Updated 5 years ago
- Modernized kernel functions, kernel tracepoints and bpf progs tracing tool for the bpf era.☆95Updated this week
- a bpf based proxy☆48Updated 3 months ago
- Trace packets as they go through iptables chains☆64Updated 8 months ago
- In-kernel QUIC implementation with Userspace handshake☆198Updated this week
- Secure proxy service indistinguishable from whitelisted TLS website☆162Updated 2 months ago
- MASQUE: Proxying UDP in HTTP/3, RFC 9298☆116Updated 3 weeks ago
- A Caddy module that blocks unwanted requests using a sha256 PoW challenge☆45Updated 2 weeks ago
- Easy per application transparent proxy built on cgroup.☆431Updated this week
- Wireguard, but compatible with mpls, no MTU overhead☆14Updated 4 months ago
- A modern proxy framework, core of YtFlow.☆90Updated last year
- Minimal working example of transparent proxying with iptables TPROXY☆48Updated 6 years ago
- Remove SNI from HTTPS☆50Updated 3 weeks ago
- redundant array of networks☆28Updated last week
- Privacy-oriented proxy & network manager, supporting WireGuard, L7 firewall, App-based policies and scripted MitM.☆61Updated 2 weeks ago
- Bidirectional NDP proxy and route maintainer to relay an IPv6 SLAAC network.☆26Updated 2 years ago
- a bare-minimum XDP router implementation with basic IPv4 and IPv6 support☆43Updated 4 years ago
- A quick and secure reverse proxy based on QUIC for NAT traversal.☆187Updated 6 months ago
- Userspace/GPU eBPF VM with llvm JIT/AOT compiler☆69Updated last week
- RISC-V VM in Bash☆24Updated 2 months ago
- An iptables extension for stateless address / port randomization.☆130Updated last year
- Generate OpenPGP keys with fingerprints that match a specific pattern (a.k.a. vanity keys)☆105Updated 2 years ago
- Restls Protocol: A Perfect Impersonation of TLS; Restls协议: 对TLS的完美伪装☆341Updated last year
- 尽力保持吞吐(有效带宽)的 TCP 发包算法☆29Updated last year
- WireGuard Benchmark using netns and iperf3☆137Updated 2 weeks ago
- Simple and fast layer 4 proxy in Rust☆18Updated 3 years ago
- Simple transparent proxy library☆159Updated last week
- 裸金属二进制翻译器的设计和实现☆43Updated 2 months ago