jankammerath / torgate
A reverse proxy for the Onion-network and an alternative to Tor2Web written in C++ using microhttpd and curl as well as the tor socks5 proxy. Onion URLs can be access by a domain extension like torgate.test.
☆14Updated 5 years ago
Alternatives and similar repositories for torgate:
Users that are interested in torgate are comparing it to the libraries listed below
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 6 months ago
- C implementation of the Kademlia-based Distributed Hash Table (DHT) used in the BitTorrent network (aka "mainline DHT")☆22Updated 4 years ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆10Updated 10 months ago
- A Tool to scrape URLs for a given domain from wayback machine, Commoncrawl and OTX Alienvault☆15Updated 3 years ago
- A library for peer discovery inside the Tor network☆27Updated 11 months ago
- tools for creating, inspecting and modifying torrent files☆11Updated 2 years ago
- ☆23Updated this week
- Go implementation of the TDEX Beta Daemon☆11Updated 7 months ago
- An HTTP proxy that enables access to Tor Onion Services☆15Updated 3 years ago
- The Microsoft community Windows Package Manager manifest repository☆7Updated last year
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆11Updated last year
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆27Updated 4 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- ☆20Updated this week
- Geolocate your files!☆16Updated 3 years ago
- The OpenAgents mobile app [wip]☆15Updated last month
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- Katzenpost is a free and open source software project dedicated to researching and developing mix network protocols☆113Updated this week
- Marketplace P2P on Lightning Network☆15Updated last year
- Fork of https://git.zx2c4.com/wintun☆13Updated last year
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)☆11Updated 3 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆18Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 7 months ago
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 5 years ago
- Low Latency Anon Routing Protocol☆68Updated 3 months ago
- Camellia cipher SIMD vector implementations for x86 (with AES-NI, VAES and/or GFNI instructions), ARM (with ARMv8 Crypto Extension instru…☆18Updated 2 years ago
- Library to read the Keybase Merkle root out of the Stellar blockchain☆12Updated last year
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago