leophys / doh-dockerLinks
A docker image to host one's DNS-over-HTTPS proxy
☆28Updated 6 years ago
Alternatives and similar repositories for doh-docker
Users that are interested in doh-docker are comparing it to the libraries listed below
Sorting:
- (Oblivious) DoH Server☆26Updated 3 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆127Updated 5 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- A simple tool to fetch and filter domain blacklists for use with tools like https://github.com/DNSCrypt/dnscrypt-proxy☆23Updated 2 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 5 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆30Updated 9 months ago
- Specifications for Privacy Proxy Implementations☆32Updated this week
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- tamper resistant audit log☆17Updated 7 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 6 years ago
- An ENGINE gluing together OpenSSL and NaCl-derived crypto.☆18Updated 2 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- IoT device scanner.☆41Updated 6 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- A tiny DNS server that returns the client (resolver) IP☆28Updated 6 months ago
- Pong revolution.☆16Updated 3 months ago
- The Swiss Army knife for backend engineers.☆95Updated 4 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 5 years ago
- SOCKS5 proxy to create SSH tunnels on demand☆32Updated 2 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆43Updated 6 years ago
- router firmwares, reverse engineering code snippets, mitm tools☆14Updated 5 years ago
- sign elf binaries with GPG☆17Updated 9 years ago
- Build docker images for dsvpn.☆17Updated 5 years ago
- ☆25Updated last year
- Parsing library for Tor-specific data formats.☆42Updated 2 years ago
- PGP key poisoner☆37Updated 6 years ago
- A Camouflage Proxy for the Tor Anonymity System☆88Updated 10 years ago
- torrent -> http plumbing☆24Updated 5 years ago