hack3ric / mimicLinks
eBPF UDP -> TCP obfuscator
☆228Updated last week
Alternatives and similar repositories for mimic
Users that are interested in mimic are comparing it to the libraries listed below
Sorting:
- An eBPF-based Endpoint-Independent(Full Cone) NAT for Linux☆281Updated 4 months ago
- Multiprotocol IP Switching (MPIS)☆25Updated 3 years ago
- A BGP speaker that feeds all China IPv4 delegations to peer.☆33Updated 5 years ago
- Bidirectional NDP proxy and route maintainer to relay an IPv6 SLAAC network.☆27Updated 3 years ago
- Wireguard, but compatible with mpls, no MTU overhead☆13Updated 9 months ago
- In-kernel QUIC implementation with Userspace handshake☆221Updated 2 weeks ago
- Secure proxy service indistinguishable from whitelisted TLS website☆163Updated 7 months ago
- Easy per application transparent proxy built on cgroup.☆466Updated last month
- A small app to generate a long path in traceroute.☆32Updated 2 years ago
- Modernized kernel functions, kernel tracepoints and bpf progs tracing tool for the bpf era.☆120Updated this week
- Remove SNI from HTTPS☆51Updated 4 months ago
- Minimal working example of transparent proxying with iptables TPROXY☆49Updated 7 years ago
- nftables fullcone expression kernel module for OpenWrt☆69Updated 2 years ago
- A memory allocation tracer combined with stack trace.☆168Updated 2 years ago
- WireGuard Benchmark using netns and iperf3☆175Updated 3 weeks ago
- MASQUE: Proxying UDP in HTTP/3, RFC 9298☆159Updated last month
- A kernel module to turn MASQUERADE into full cone SNAT☆447Updated 3 years ago
- This repo includes the artifacts for the USENIX Security 2023 paper How China Detects and Blocks Fully Encrypted Traffic: https://gfw.rep…☆165Updated 2 years ago
- redundant array of networks☆27Updated 4 months ago
- A tool that enable multiple ssh client implementations to use a common ssh agent on Windows.☆68Updated 4 years ago
- Proxy UDP traffic over a TCP stream☆496Updated 3 weeks ago
- NDP Proxy / Responder daemon (IPv6)☆44Updated 3 months ago
- Generate OpenPGP keys with fingerprints that match a specific pattern (a.k.a. vanity keys)☆106Updated 2 years ago
- RISC-V VM in Bash☆29Updated 6 months ago
- Start a RAM Linux system and free your system disk without physical access to your server.☆84Updated 2 years ago
- Transparent Proxy with cgroup v2。透明代理,配合v2ray/Qv2ray食用最佳☆363Updated 2 years ago
- A fake SSH tarpit that logs passwords and commands from attackers☆34Updated 2 months ago
- Personal collection of IP ranges not in China but work good enough☆37Updated 9 months ago
- Filter TLS traffic with IPtables☆245Updated 2 months ago
- 🧵 A HTTP(S) mirroring tool written in Rust, proposed for ustcmirror☆19Updated this week