proxychains
i2pd
Our great sponsors
proxychains | i2pd | |
---|---|---|
19 | 54 | |
6,053 | 3,093 | |
- | 1.9% | |
7.0 | 9.5 | |
4 months ago | 6 days ago | |
C | C++ | |
GNU General Public License v3.0 only | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
proxychains
-
Using LD_PRELOAD to cheat, inject features and investigate programs
Fun fact: proxychains uses LD_PRELOAD [0] to hook the necessary syscalls [1] for setting up a "proxy environment" for the wrapped program, e.g. `connect`, `gethostbyname`, `gethostbyaddr`, etc. Note this also implies that it could be leaky in some cases when applied to a program that uses alternative syscalls to make an external connection.
[0] https://github.com/haad/proxychains/blob/master/src/proxycha...
[1] https://github.com/haad/proxychains/blob/master/src/libproxy...
- IRC question
- Issue with proxychains and SSH tunneling
-
Help with bypassing hospital VPN and wireguard block
You can use ProxyChains in order to use the SOCKS5 proxy with any application, depending on the OS you are using.
-
/etc/proxychains.conf is empty
I assume that https://github.com/haad/proxychains is the project in question. At https://github.com/haad/proxychains/blob/master/src/proxychains.conf you can view the contents of the configuration file and then save it in /etc/proxychains.conf.
-
Proxychains.conf empty???
That is weird. However, missing configs are usually an easy problem to solve - simply find one online and copy it (once you understand it). Here is the one from the proxy chains repo. Lastly, be careful with Kali, it's definitely not suited to beginners (you're doing the right thing running it in a VM at least).
-
TOOL: ntlmrelayx2proxychains
ntlmrelayx2proxychains aims to connect the tool of the SecureAuthCorps' impacket suite, ntlmrelayx.py (hereafter referred to as "ntlmrelayx"), along with @byt3bl33d3r's tool, CrackMapExec (hereafter referred to as "CME"), over proxychains, developped by haad.
- Digital War Against Putin -- Automated Google Reviews with Python
-
Setting network proxy on linux desktop
You can go even further with tools like proxychains that let you chain multiple proxies. This is used while setting up tor and comes pre-installed with pentesting distros like Kali and ParrotOS.
- ProxyChains
i2pd
-
I want to help the network, but need assistance
I'm running a tor bridge on my home proxmox box, and I'm interested in running an i2p node as well but I have no experience with this. From what I was able to gather the easiest way is to install the i2pd .deb (https://github.com/PurpleI2P/i2pd/releases).
-
[task] link me up with i2pd (c++) developers for a small fee
need someone to find me c++ developers who are very familiar with the i2pd codebase and link me up with them for the price of $25 USD (I can do payments in crypto or cashapp).
- I2P: End-to-End encrypted and anonymous Internet
-
Tor’s history of D/DoS attacks and future strategies for mitigation
If you really dislike Java that much, there are other I2P implementations like this:
https://github.com/PurpleI2P/i2pd
-
ansible role for i2pd
I created an ansible role for i2pd. Basically, this allows system administrators who want to take part in the I2P network to automate i2pd deployment.
- I2P adoption in qBittorrent has begun
-
Freenet 2023: a drop-in decentralized replacement for the web - and more
Check this: https://i2pd.website/
-
i2pd
there may be instructions in the github i think? https://github.com/PurpleI2P/i2pd
-
Cloudflare Disables Access to ‘Pirated’ Content on Its IPFS Gateway
> We are building network which helps people to communicate and share information without restrictions.
> Free from censorship. Free from privacy violations.
https://i2pd.website/
I2P is neither “for” nor “not for” piracy. I2P is for protecting communications and data from any kind of censorship.
Filtering copyright violating content is a type of censorship. To some it is justified. To others it is not.
To a network protocol like I2P the point is that no kind of censorship should be possible. Regardless of reason.
What are some alternatives?
torsocks - Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git
i2p.i2p - I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
CrackMapExec - A swiss army knife for pentesting networks
i2p-zero - Zero dependency, small footprint, cross-platform I2P Java Router with simple tunnel/socks controller and SAM interface
Tor - Tor protects your privacy on the Internet by hiding the connection between your Internet address and the services you use. (This is *not* the official repository.)
i2pplus - I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer - this is a mirror of https://gitlab.com/i2pplus/I2P.Plus/
nipe - An engine to make Tor network your default gateway
Freenet - Freenet REference Daemon
sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.
InviZible - Android application for online privacy and security
impacket - Impacket is a collection of Python classes for working with network protocols.
i2pdbrowser - i2pd browser bundle