leophys / doh-dockerLinks
A docker image to host one's DNS-over-HTTPS proxy
☆28Updated 6 years ago
Alternatives and similar repositories for doh-docker
Users that are interested in doh-docker are comparing it to the libraries listed below
Sorting:
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- (Oblivious) DoH Server☆26Updated 3 years ago
- tamper resistant audit log☆17Updated 7 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 5 years ago
- Pong revolution.☆16Updated 3 months ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- A Camouflage Proxy for the Tor Anonymity System☆87Updated 10 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Updated 7 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Updated 8 years ago
- Parsing library for Tor-specific data formats.☆42Updated 2 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 5 years ago
- A DNSCurve Forwarding Name Server☆57Updated 4 years ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆33Updated last month
- An apt transport method enabling i2p using the SAM bridge.☆19Updated 8 months ago
- router firmwares, reverse engineering code snippets, mitm tools☆14Updated 5 years ago
- A simple and stupid load testing tool for DNS resolvers☆55Updated 8 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Import and display Masscan data☆35Updated 9 months ago
- Quic Pluggable Transport for Tor.☆16Updated 7 years ago
- Send and receive files securely through Tor.☆43Updated 2 years ago
- An implementation of the concepts behind the Logjam attack☆16Updated 9 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Build docker images for dsvpn.☆17Updated 5 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- A Small Tor Relay Server with obfs4proxy on Alpine Linux on Docker☆39Updated 4 years ago
- The Swiss Army knife for backend engineers.☆95Updated 4 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Updated 2 years ago