Cloak
proxychains
Cloak | proxychains | |
---|---|---|
17 | 19 | |
3,615 | 7,231 | |
1.0% | 0.2% | |
6.1 | 6.2 | |
11 days ago | about 1 year ago | |
Go | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Cloak
- Any servers working in Russia left?
-
Wireguard is banned in China, anything I could do about it?
You can try cloak? It is meant to circumvent these types of bans.
-
How to use Outline with Cloak?
Already saw this Cloak Underlying proxy configuration guides but could not understand how to do it with outline server.
-
Help with bypassing hospital VPN and wireguard block
does this might help you ? https://github.com/cbeuw/Cloak
-
Cloak: Censorship Circumvention Tool
>it's not clear that Cloak does anything novel when compared to existing systems.
I'm not an expert on censorship-circumvention utilities but I found this comment when browsing the Cloak source repository that may partially answer your question:
https://github.com/cbeuw/Cloak/issues/169#issuecomment-12574...
>, and how do you prevent the censoring regime from finding and blocking them?
The tools like Cloak try to work on the principle "collateral freedom" which hides censored data inside of "internet services that are too big block" : https://en.wikipedia.org/wiki/Collateral_freedom
And the effectiveness of that strategy depends on the hackability of those internet services as they can sometimes change the rules which close the loopholes of "collateral freedom" : https://en.wikipedia.org/wiki/Domain_fronting#Disabling
- Cloak - Censorship Circumvention Tool
-
Wireguard handshake in IRAN - HELP
I recommend https://github.com/cbeuw/Cloak which is designed for this use case.
proxychains
-
Using LD_PRELOAD to cheat, inject features and investigate programs
Fun fact: proxychains uses LD_PRELOAD [0] to hook the necessary syscalls [1] for setting up a "proxy environment" for the wrapped program, e.g. `connect`, `gethostbyname`, `gethostbyaddr`, etc. Note this also implies that it could be leaky in some cases when applied to a program that uses alternative syscalls to make an external connection.
[0] https://github.com/haad/proxychains/blob/master/src/proxycha...
[1] https://github.com/haad/proxychains/blob/master/src/libproxy...
- IRC question
- Issue with proxychains and SSH tunneling
-
Help with bypassing hospital VPN and wireguard block
You can use ProxyChains in order to use the SOCKS5 proxy with any application, depending on the OS you are using.
-
/etc/proxychains.conf is empty
I assume that https://github.com/haad/proxychains is the project in question. At https://github.com/haad/proxychains/blob/master/src/proxychains.conf you can view the contents of the configuration file and then save it in /etc/proxychains.conf.
-
Proxychains.conf empty???
That is weird. However, missing configs are usually an easy problem to solve - simply find one online and copy it (once you understand it). Here is the one from the proxy chains repo. Lastly, be careful with Kali, it's definitely not suited to beginners (you're doing the right thing running it in a VM at least).
-
TOOL: ntlmrelayx2proxychains
ntlmrelayx2proxychains aims to connect the tool of the SecureAuthCorps' impacket suite, ntlmrelayx.py (hereafter referred to as "ntlmrelayx"), along with @byt3bl33d3r's tool, CrackMapExec (hereafter referred to as "CME"), over proxychains, developped by haad.
- Digital War Against Putin -- Automated Google Reviews with Python
-
Setting network proxy on linux desktop
You can go even further with tools like proxychains that let you chain multiple proxies. This is used while setting up tor and comes pre-installed with pentesting distros like Kali and ParrotOS.
- ProxyChains
What are some alternatives?
v2ray-core - A platform for building proxies to bypass network restrictions.
CrackMapExec - A swiss army knife for pentesting networks
udp2raw - A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
torsocks - Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git
wireguard-manager - ✔️ WireGuard-Manager is an innovative tool designed to streamline the deployment and management of WireGuard VPNs. Emphasizing user-friendliness and security, it simplifies the complexities of VPN configuration, offering a robust yet accessible solution for both personal and professional use.
sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.