spotproxy-project / spotproxy
Cloud-hosted proxies with minimal cost and maximum circumvention utility
☆16Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for spotproxy
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆13Updated 9 months ago
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆13Updated last year
- ☆20Updated last year
- ☆24Updated 8 months ago
- ditto: WAN Traffic Obfuscation at Line Rate (source code belonging to the NDSS 2022 paper)☆28Updated 2 years ago
- Script fingerprinting systems based on shodan.io data☆13Updated 6 years ago
- ☆10Updated 4 years ago
- Clone network interface from one host as a tap interface on another host☆54Updated 3 years ago
- Fingerprint-resistance module for pion/dtls.☆12Updated this week
- A set of PCAPs used to test the parsers used by Malcolm. Also, a curated list of PCAP collections I've found online.☆32Updated this week
- Retina is a network analysis framework that supports 100+ Gbps traffic analysis on a single server with no specialized hardware.☆148Updated last week
- Enabling data-informed network simulation☆14Updated last year
- Transparent Security is a solution for identify the source devices of a DDoS attack and mitigates the attack in the customer premises or …☆34Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Updated 11 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated last month
- Exploring various defensive response options for effectively securing a 5G core-network☆39Updated 6 months ago
- Predicting network performance at scale☆31Updated 2 years ago
- Network Tools☆32Updated 11 months ago
- The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.☆82Updated 7 months ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆21Updated 3 weeks ago
- An O-RAN compliant runtime intrusion detection system (xApp) for layer-3 (L3) celluar attack detection☆40Updated 2 weeks ago
- A command-line utility that scans for Wi-Fi networks using the 802.11 netlink API.☆28Updated last month
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- ☆22Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- ☆35Updated 2 years ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆63Updated last year
- This is a dataset of 5G network traffic for use with machine learning tools to benchmark attack detection capabilities for multiple diffe…☆56Updated 3 weeks ago
- ☆17Updated 4 years ago
- Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC)…☆14Updated last month