Hidden VPN protocol to avoid large scale blocking of TLS-based censorship circumvention
☆84Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for Terminator-Samurai-VPN
Users that are interested in Terminator-Samurai-VPN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Submit tweets for https://twitter.com/SemanticRelease using pull requests☆13Aug 6, 2024Updated last year
- Extensible MacOS system telemetry generator.☆56Mar 1, 2026Updated last month
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- Reliable udp tunnel written in Rust using Aeron☆10Jun 24, 2021Updated 4 years ago
- 🐳 Docker Image Packaging for BIRD☆11Aug 7, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Everything related to YARA☆16Feb 19, 2026Updated last month
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- ☆11Jul 4, 2022Updated 3 years ago
- It automatically picks OTP from sms. I implemented this without using any Flutter plugin.☆14Nov 15, 2022Updated 3 years ago
- UDP packet obfuscation with eBPF, which tunnels UDP over pseudo-TCP☆10Jun 5, 2023Updated 2 years ago
- Maximize UDP network IO performance.☆24Feb 9, 2026Updated 2 months ago
- Docker Compose to deploy AmneziaWG services☆16Aug 15, 2024Updated last year
- ☆15Aug 3, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 2 years ago
- ☆18Jan 22, 2026Updated 2 months ago
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- Python and Fortran Numerical Implementations of the Polya Enumeration Theorem☆13Nov 9, 2016Updated 9 years ago
- tiny-singlefile-encrypted-udp-tunnel☆15Jul 5, 2017Updated 8 years ago
- The RedHerring plugin is an extension for the CTFd platform that introduces a new type of challenge. It aims to promote fairness and prev…☆12Sep 6, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.☆21Nov 13, 2022Updated 3 years ago
- simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose☆17Feb 24, 2023Updated 3 years ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- ☆18Apr 7, 2023Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Mar 24, 2023Updated 3 years ago
- Foxit Image Converter Fuzzing Harness☆17Jun 11, 2020Updated 5 years ago
- Go implementation of the OpenConnect VPN Protocol for client side development. Engine for AnyLink Secure Client.☆65Nov 30, 2025Updated 4 months ago
- Port Crawler Pythonized☆19Dec 8, 2022Updated 3 years ago
- Create a custom component from a Home Assistant Integration Pull Request. Use this when you want to test a pull request that changes a bu…☆11May 11, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ANY.RUN sandbox detection collection☆22Aug 21, 2024Updated last year
- Fully External BFV ESP with Player/Entity Pointer Decryption☆17Jun 25, 2020Updated 5 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Updated this week
- Extract API endpoints in APK☆23Aug 31, 2023Updated 2 years ago
- 🗂 Knowledge Base on the Security of Chromium Extensions (https://extensions.neplox.security)☆21Jan 24, 2025Updated last year
- A kernel module to obtain source IPv4 address in the TCP option section.☆26Mar 22, 2022Updated 4 years ago