jankammerath / torgate
A reverse proxy for the Onion-network and an alternative to Tor2Web written in C++ using microhttpd and curl as well as the tor socks5 proxy. Onion URLs can be access by a domain extension like torgate.test.
☆14Updated 5 years ago
Alternatives and similar repositories for torgate:
Users that are interested in torgate are comparing it to the libraries listed below
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆9Updated 8 months ago
- A library for peer discovery inside the Tor network☆28Updated 9 months ago
- Encryption Algorithm Combined☆25Updated 8 years ago
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 4 years ago
- Granular Rigid Body Simulation Framework: efficient research tools to simulate non-smooth granular rigid body dynamics.☆10Updated last year
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆23Updated 4 months ago
- Go implementation of the TDEX Beta Daemon☆11Updated 4 months ago
- ☆24Updated this week
- Editing Packet Data on the fly using Nfqueue and Scapy☆12Updated 5 years ago
- Broadcast paid video content over P2P, Powered by Lightning network and Dazaar☆13Updated 4 years ago
- Easily expose local services via Tor☆28Updated 2 months ago
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆11Updated 11 months ago
- Sometimes, you need to manipulate low-level functionality (C APIs, etc) from high-level languages (Python). Eg. Force the low-level calls…☆14Updated 7 months ago
- My software engineering notes.☆17Updated this week
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆16Updated 7 years ago
- Linux kernel module to fight against police terror☆28Updated 3 years ago
- Multifunctional keylogger using WinAPI and libcurl☆17Updated 3 years ago
- Hook for the PoC for exploiting CVE-2024-32002☆15Updated 8 months ago
- ☆18Updated 9 months ago
- Android HAL☆8Updated last month
- EWDK C++ toolchain for bazel☆9Updated 7 months ago
- ☆9Updated 2 years ago
- Censorship circumvention. Reroute and optionally obfuscate traffic destined for the Mullvad API.☆19Updated 4 months ago
- HTTP/HTTPS/WebSocket proxy server for viewing and intercepting web traffic.☆12Updated 9 months ago
- CA Issuers Monitor (Authority Info Access)☆13Updated last year
- StegoDisk is cross platform steganographic file system☆10Updated last year
- Bittorrent protocol implementation including DHT using c++ Asio☆10Updated last month
- OpenVPN with ocproxy/tunsocks VPN-to-proxy ("socks2tun") support Proof-of-concept☆18Updated last year
- Proof of concept: Launch a Chromium browser (Chrome) inside docker and stream ausio and video through WebRTC using Gstreamer.☆10Updated 6 years ago
- ARM Processor, Computer Architecture laboratory, University of Tehran☆10Updated 3 years ago