mirimir / vpnchainsLinks
dynamic nested VPN chains in Linux
☆35Updated 5 years ago
Alternatives and similar repositories for vpnchains
Users that are interested in vpnchains are comparing it to the libraries listed below
Sorting:
- A script used to create a whonix like gateway/workstation environment with docker containers.☆126Updated 6 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 6 years ago
- A minimal tool that hides your online assets from online security scanners, researchers and hackers.☆116Updated 5 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆28Updated 7 years ago
- Easily setup a hidden service inside the Tor network☆175Updated 2 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- Create torrc files optimized for speed, security, or avoiding captchas☆68Updated 3 years ago
- Man-in-the-middle against Tor bridges☆28Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- A curated list of awesome Internet port and host scanners, plus related components and much more, with a focus on free and open source pr…☆234Updated 3 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- zero-trust remote firewall instrumentation☆253Updated last year
- Tor traffic whitelisting gateway☆74Updated 6 months ago
- TorGhost redirects all your internet traffic through SOCKS5 Tor proxy.☆65Updated last year
- Create Tor hidden services in Python.☆52Updated 2 years ago
- ☆31Updated 5 years ago
- Operational Security utility and automator.☆140Updated 5 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆72Updated 2 years ago
- Tools and libraries for interacting with the Netograph API☆47Updated 2 years ago
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆51Updated 9 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- This is a repository that will be used to help create a process of a new kali vagrant box for hashicorp each week.☆42Updated 2 years ago
- A Docker image for bits of Kali Linux☆31Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆19Updated 5 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- ☆73Updated 4 years ago
- Domain based VPN Gateway/Proxy for all devices☆58Updated 5 years ago
- Intrusion Prevention System (IPS) for Secure Shell (SSH)☆53Updated 12 years ago
- A fork of TorGhost, a little utilitly used to route all traffic through TOR.☆52Updated 5 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆21Updated 8 years ago