jankammerath / torgate
A reverse proxy for the Onion-network and an alternative to Tor2Web written in C++ using microhttpd and curl as well as the tor socks5 proxy. Onion URLs can be access by a domain extension like torgate.test.
☆14Updated 5 years ago
Alternatives and similar repositories for torgate:
Users that are interested in torgate are comparing it to the libraries listed below
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 6 months ago
- How Enable Security handles security vulnerabilities☆11Updated 5 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 8 months ago
- DarkDotFail's Onion Mirror Guidelines validation library.☆9Updated 4 years ago
- An HTTP proxy that enables access to Tor Onion Services☆15Updated 3 years ago
- Unofficial LibGCrypt with added custom native Visual Studio project build tools. LibGCrypt: Libgcrypt is a general purpose cryptographic …☆27Updated 4 months ago
- Internet History, Digital Cryptography, Cypherpunks, Money \ Economics... All the history is related to Bitcoin.☆27Updated 9 months ago
- C implementation of the Kademlia-based Distributed Hash Table (DHT) used in the BitTorrent network (aka "mainline DHT")☆22Updated 4 years ago
- An experimental library for PDP and POR☆29Updated 4 years ago
- A crawler for the IPFS network, code for our paper (https://arxiv.org/abs/2002.07747). Also holds scripts to evaluate the obtained data a…☆69Updated 5 months ago
- An injection of the NIST, ETH, LTC, and ZEC Random Beacons into Bitcoin☆16Updated this week
- C++ SAMv3 library☆37Updated 6 months ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆18Updated last year
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 5 years ago
- CA Issuers Monitor (Authority Info Access)☆13Updated 2 years ago
- A library for peer discovery inside the Tor network☆27Updated 11 months ago
- Encryption Algorithm Combined☆25Updated 9 years ago
- Geolocate your files!☆16Updated 3 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆27Updated 4 years ago
- Recover Monero address using the private spend key☆11Updated 8 years ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Updated 5 years ago
- tools for creating, inspecting and modifying torrent files☆11Updated 2 years ago
- Root Program parsers and SQL import script generators☆24Updated 3 months ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 6 years ago
- Extract information from Monero's blockchain into custom lmdb databases☆14Updated 7 years ago
- Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI☆23Updated 6 years ago
- Tool for findings bugs in epoll-based Linux servers☆29Updated 4 years ago
- ARM Processor, Computer Architecture laboratory, University of Tehran☆10Updated 3 years ago
- An AES-based 384 bit permutation.☆19Updated 5 years ago
- Simple ChaCha20Poly1305@Bitcoin C implementation☆29Updated 6 years ago