Cloak
Proxy enhancer
A tool that enhances proxy services to evade censorship detection by creating a stealthy network connection.
A censorship circumvention tool to evade detection by authoritarian state adversaries
3k stars
69 watching
302 forks
Language: Go
last commit: about 1 month ago
Linked from 1 awesome list
censorshipcensorship-circumventiongfwopenvpnpluggable-transportsproxyshadowsockstorvpn
Related projects:
Repository | Description | Stars |
---|---|---|
cbeuw/goquiet | Obfuscates Shadowsocks traffic to mimic HTTPS and evades deep packet inspection | 821 |
klzgrad/naiveproxy | A system designed to disguise and protect internet traffic from censorship and surveillance by leveraging Chrome's network stack | 6,685 |
everywall/ladder | A proxy tool designed to bypass paywalls and remove CORS headers from responses | 4,474 |
danielberkompas/cloak | An Elixir encryption library designed to simplify secure data storage and transfer | 581 |
trycatchhcf/cloakify | A tool for hiding data in plain sight by transforming it into innocuous-looking strings | 1,558 |
drk1wi/modlishka | A tool designed to support security-related testing and mitigation by providing a transparent reverse proxy service with flexible configuration options. | 4,847 |
kdzwinel/betwixt | Analyzes web traffic outside the browser using Chrome DevTools interface | 4,538 |
opennhp/opennhp | A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. | 13,513 |
blacklanternsecurity/bbot | A multipurpose scanner built to automate reconnaissance, bug bounty, and assembly security testing | 5,289 |
flaresolverr/flaresolverr | A proxy server to bypass Cloudflare protection by solving Cloudflare challenges | 7,837 |
erebe/wstunnel | A tool to bypass firewalls and proxies by tunneling traffic over Websocket or HTTP2 | 4,310 |
dnscrypt/dnscrypt-proxy | A tool for encrypting and anonymizing DNS traffic using various protocols. | 11,459 |
bishopfox/h2csmuggler | Smuggling HTTP traffic past proxy rules to bypass access controls | 650 |
v3aqb/fwlite | An anti-censorship HTTP proxy with built-in support for various protocols. | 136 |
kevin-robertson/inveigh | A .NET-based tool for conducting spoofing attacks and hash/credential captures in network protocols. | 2,555 |