jankammerath / torgate
A reverse proxy for the Onion-network and an alternative to Tor2Web written in C++ using microhttpd and curl as well as the tor socks5 proxy. Onion URLs can be access by a domain extension like torgate.test.
☆14Updated 5 years ago
Alternatives and similar repositories for torgate:
Users that are interested in torgate are comparing it to the libraries listed below
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 7 months ago
- A library for peer discovery inside the Tor network☆27Updated last year
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆10Updated 11 months ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- A crawler for the IPFS network, code for our paper (https://arxiv.org/abs/2002.07747). Also holds scripts to evaluate the obtained data a…☆69Updated 5 months ago
- 🚧 WIP: tor transport for libp2p☆56Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 8 months ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆27Updated 4 years ago
- Linux kernel module to fight against police terror☆28Updated 3 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- Calling binary RPC methods of the Monero daemon and wallet☆13Updated 6 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆20Updated 4 years ago
- Make AES-GCM safe to use with random nonces, for any practical number of messages.☆18Updated last year
- A tiny library to properly encrypt IP addresses.☆13Updated last week
- Android HAL☆9Updated last month
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆22Updated last year
- Go implementations of BLAKE2b and BLAKE2s with support for salts and personalization☆10Updated 4 years ago
- A libp2p-like protocol with first class support for embedded systems. End goal is a protocol that can run on anything from your fridge, e…☆34Updated 4 years ago
- ☆10Updated 3 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- Specification for the AEGIS family of authenticated encryption algorithms.☆16Updated this week
- Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf☆15Updated 5 years ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆18Updated 2 years ago
- Proxy for efficiently circumventing censorship using existing tools and gathering information about censorship around the world.☆13Updated 6 years ago
- Low Latency Anon Routing Protocol☆70Updated 4 months ago
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)☆11Updated 3 years ago