mirimir / vpnchainsLinks
dynamic nested VPN chains in Linux
☆35Updated 5 years ago
Alternatives and similar repositories for vpnchains
Users that are interested in vpnchains are comparing it to the libraries listed below
Sorting:
- Bash script for making chained OpenVPN connections.☆89Updated 4 years ago
- A script used to create a whonix like gateway/workstation environment with docker containers.☆124Updated 5 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 5 years ago
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆51Updated 9 years ago
- A minimal tool that hides your online assets from online security scanners, researchers and hackers.☆115Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Tor traffic whitelisting gateway☆73Updated 5 months ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Easily setup a hidden service inside the Tor network☆175Updated last year
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆27Updated 7 years ago
- Create torrc files optimized for speed, security, or avoiding captchas☆67Updated 3 years ago
- Onion Tunnel: Proxy Every Hidden Service on localhost☆13Updated 4 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- This is a repository that will be used to help create a process of a new kali vagrant box for hashicorp each week.☆42Updated 2 years ago
- Operational Security utility and automator.☆138Updated 5 years ago
- A Docker image for bits of Kali Linux☆31Updated 2 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆72Updated 2 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆73Updated 4 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Obfuscating OpenVPN traffic using obfs4proxy - Linux platform☆94Updated 6 years ago
- Create automated tasks and keep an eye on interesting things!☆85Updated 7 months ago
- Domain based VPN Gateway/Proxy for all devices☆58Updated 5 years ago
- zero-trust remote firewall instrumentation☆251Updated last year
- a more secure way to force programs to exclusively use tor network☆203Updated 3 years ago
- Tor v3 onion services (hidden services) for Docker containers☆77Updated 5 years ago
- Dashboard to monitor Tor node operations☆120Updated 2 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago