jankammerath / torgateLinks
A reverse proxy for the Onion-network and an alternative to Tor2Web written in C++ using microhttpd and curl as well as the tor socks5 proxy. Onion URLs can be access by a domain extension like torgate.test.
☆14Updated 6 years ago
Alternatives and similar repositories for torgate
Users that are interested in torgate are comparing it to the libraries listed below
Sorting:
- tools for creating, inspecting and modifying torrent files☆11Updated 3 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 9 months ago
- Hook for the PoC for exploiting CVE-2024-32002☆16Updated last year
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- A tool for securing communications between a client and a DNS resolver☆31Updated 12 years ago
- ☆23Updated 5 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 3 weeks ago
- Low Latency Anon Routing Protocol☆72Updated this week
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with al…☆77Updated 6 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 11 months ago
- DarkDotFail's Onion Mirror Guidelines validation library.☆10Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆27Updated 4 years ago
- ARM Processor, Computer Architecture laboratory, University of Tehran☆10Updated 3 years ago
- Oh no, stop this. You can see my local IP address 😲! Use `foundation` attribute against CRC32 lookup table to reveal local IP address of…☆59Updated 2 years ago
- Zom3 update based on Keanu Trinity release☆29Updated last year
- ☆18Updated last year
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Updated 6 years ago
- Library to support cross-platform AES encryption☆12Updated 9 months ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆11Updated last year
- Proposal for a MulticastReceiver API for web apps☆14Updated 3 years ago
- Misuse cases of Cryptography in real world software products☆12Updated 6 years ago
- Geolocate your files!☆16Updated 3 years ago
- C implementation of the Kademlia-based Distributed Hash Table (DHT) used in the BitTorrent network (aka "mainline DHT")☆23Updated 4 years ago
- Library for accessing Intel PCH SPI☆15Updated 3 months ago
- Go implementation of the TDEX Beta Daemon☆12Updated 10 months ago
- MitM proxy which performs opportunistic SSL/TLS stripping☆18Updated 5 years ago