Proteus: Programmable Protocols for Censorship Circumvention
☆37Jun 6, 2025Updated 8 months ago
Alternatives and similar repositories for proteus
Users that are interested in proteus are comparing it to the libraries listed below
Sorting:
- WebAssembly Transport Executables Runtime☆38Jun 26, 2025Updated 8 months ago
- WebAssembly Transport Executables Runtime -- A more "Pluggable" Transport☆19Mar 10, 2025Updated 11 months ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Network emulation for writing integration tests in Go☆11Sep 5, 2025Updated 5 months ago
- A sub-RFC1928 SOCKS5 server implementation in Go with zero external dependencies.☆13Sep 5, 2023Updated 2 years ago
- ☆14Jun 2, 2024Updated last year
- A pure Go implementation of the Windows Packet Filter NDISAPI library☆24Aug 20, 2025Updated 6 months ago
- Proxy for efficiently circumventing censorship using existing tools and gathering information about censorship around the world.☆14Jun 27, 2018Updated 7 years ago
- Hive dependency injection☆23Updated this week
- Automatically handle Cloudflare CAPTCHA challenges for seamless browsing experience☆19Mar 13, 2024Updated last year
- A pluggable, obfuscated datagram transport for horrible networks☆47Sep 1, 2024Updated last year
- Lantern Client code☆26Feb 13, 2026Updated 2 weeks ago
- A proxy protocol implementation lib.☆18Apr 16, 2024Updated last year
- Documentation of observed QUIC censorship methods and circumvention approaches.☆52Apr 28, 2025Updated 10 months ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- The Internet censorship bibliography.☆157Dec 11, 2025Updated 2 months ago
- a client for vpngate.net☆28Feb 21, 2026Updated last week
- Fast JSON serializer for golang.☆23Aug 22, 2021Updated 4 years ago
- ☆30Jun 10, 2024Updated last year
- Internet Draft for survey of technical mechanisms for censorship☆21Mar 29, 2023Updated 2 years ago
- TLS wrapper for UDP sessions with active probing protection☆29Feb 5, 2024Updated 2 years ago
- Low-level access to the QUIC Initial Packet for mimicry purposes, hard fork of quic-go.☆68Nov 20, 2025Updated 3 months ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Super Amazing Universal Composability, Yeah!☆32Apr 26, 2022Updated 3 years ago
- Qubes component: linux-utils☆28Feb 20, 2026Updated last week
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- default game for freeminer☆12Feb 17, 2026Updated last week
- A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels an…☆11Dec 9, 2025Updated 2 months ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆38Oct 2, 2020Updated 5 years ago
- Layer 7 DDoS tool that supports sophisticated attack methods.☆26Jul 6, 2025Updated 7 months ago
- Multi-Armed Bandit (MAB) algorithm implementation in go☆30Nov 25, 2019Updated 6 years ago
- ☆13Dec 15, 2025Updated 2 months ago
- Decoy handshake for Wireguard☆35Aug 27, 2023Updated 2 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Reference implementation of Mel☆32Jun 21, 2024Updated last year