sorbo / tcpcrypt
Fast TCP encryption
☆247Updated 2 years ago
Alternatives and similar repositories for tcpcrypt
Users that are interested in tcpcrypt are comparing it to the libraries listed below
Sorting:
- Fast TCP encryption☆211Updated 2 years ago
- Simple and secure VPN software☆76Updated 5 years ago
- opmsg p2p transport network☆71Updated 6 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 9 years ago
- lots of performance (or lots of porn, if you prefer) httpd: Easy, chrooted, fast and simple to use HTTP server for static content. Runs …☆143Updated 5 years ago
- ipcrypt implementation in C☆32Updated 3 weeks ago
- mirror of djb's "NaCl: Networking and Cryptography library"☆50Updated 14 years ago
- Noise-C, a plain C implementation of the Noise protocol☆319Updated 9 months ago
- IP-format-preserving encryption, with a dedicated 4-byte cipher☆105Updated 4 years ago
- Wiki for Noise development☆82Updated 9 years ago
- Broadcast Copy☆263Updated 9 years ago
- A DNSCurve Forwarding Name Server☆58Updated 3 years ago
- privilege separation engine for OpenSSL / LibreSSL☆197Updated 11 months ago
- Python bindings to the Crypto++ library☆49Updated last year
- BitTorrent DHT bootstrap node☆72Updated 4 years ago
- stream encoding toolkit☆55Updated 9 years ago
- Tor client library implementation.☆50Updated 12 years ago
- NATs free DHT(Kademlia) library in C++.☆56Updated 13 years ago
- A simple proof of work, mainly designed to mitigate DDoS attacks.☆25Updated 4 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆88Updated 13 years ago
- C++ Implementation of ZRTP protocol - GNU ZRTP C++☆117Updated 9 months ago
- A mirror of VTUN, with some changes☆66Updated 5 years ago
- A really tiny crypto library.☆157Updated 2 weeks ago
- Synproxy netfilter target☆16Updated 11 years ago
- Totally Isolated TLS Unwrapping Server☆111Updated 4 years ago
- A Polymorphic Engine for Filtering-Resistant Transport Protocols☆289Updated 2 years ago
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆37Updated last year
- Secure HSM implementation based on MirageOS☆37Updated 2 years ago
- C++ SAMv3 library☆37Updated 7 months ago
- The Pynchon Gate: strong pseudonymous PIR-based email. (Work in progress)☆52Updated 13 years ago