proxychains VS tup

Compare proxychains vs tup and see what are their differences.

proxychains

proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" for SOCKS4/5, "basic" for HTTP. (by haad)

tup

Tup is a file-based build system. (by gittup)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
proxychains tup
19 23
6,053 1,139
- -
7.0 7.7
4 months ago 28 days ago
C C
GNU General Public License v3.0 only GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

proxychains

Posts with mentions or reviews of proxychains. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-09-08.

tup

Posts with mentions or reviews of tup. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-03.
  • Show HN: Hancho – A simple and pleasant build system in ~500 lines of Python
    4 projects | news.ycombinator.com | 3 Mar 2024
    Whenever looking at one these, I think back to the obscure but interesting "tup":

    “How is it so awesome? In a typical build system, the dependency arrows go down. Although this is the way they would naturally go due to gravity, it is unfortunately also where the enemy's gate is. This makes it very inefficient and unfriendly. In tup, the arrows go up.”

    https://gittup.org/tup/

  • Mazzle – A Pipelines as Code Tool
    1 project | news.ycombinator.com | 31 Dec 2023
    Once upon a time, you could roll your own of this using `tup` which might have my favorite "how it works" in the readme:

    How is it so awesome?

    In a typical build system, the dependency arrows go down. Although this is the way they would naturally go due to gravity, it is unfortunately also where the enemy's gate is. This makes it very inefficient and unfriendly. In tup, the arrows go up. This is obviously true because it rhymes. See how the dependencies differ in make and tup:

    [ Make vs. Tup ]

    See the difference? The arrows go up. This makes it very fast.

    https://gittup.org/tup/

    Also has a whitepaper: https://gittup.org/tup/build_system_rules_and_algorithms.pdf

  • Using LD_PRELOAD to cheat, inject features and investigate programs
    6 projects | news.ycombinator.com | 8 Sep 2023
  • Mk: A Successor to Make [pdf]
    5 projects | news.ycombinator.com | 16 Jul 2023
  • What should I use to take notes in college?
    13 projects | /r/archlinux | 23 Jun 2023
    Ten years ago, I used reStructuredText and its support for LaTeX math and syntax highlighting. I used tup (tup monitor -a -f) to take care of running rst2html on save.
  • Knit: Making a Better Make
    6 projects | news.ycombinator.com | 8 Apr 2023
  • Buck2: Our open source build system
    3 projects | /r/cpp | 6 Apr 2023
    I might be showing my ignorance here, but this just sounds like Tup? https://gittup.org/tup/
  • Small Project Build Systems (2021)
    2 projects | news.ycombinator.com | 3 Apr 2023
    I agree. While I like the idea of tup (https://gittup.org/tup/ -- the first "forward" build system I remember hearing of), writing a makefile is easy enough that thinking about the problem upside-down doesn't offer a compelling reason to switch.

    Ptrace is one option for tracing dependencies, but it comes with a performance hit. A low-level alternative would be ftrace (https://lwn.net/Articles/608497/) or dtrace (https://en.wikipedia.org/wiki/DTrace).

    Tup uses LD_PRELOAD (or equivalent) to intercept calls to C file i/o functions. On OSX it looks DYLD_INSERT_LIBRARIES would be the equivalent.

  • Why Use Make
    10 projects | news.ycombinator.com | 11 Jan 2023
    * order-only prerequisites - X must happen before Y if it's happening but a change in X doesn't trigger Y

    This is just a small selection and there are missing things (like how to handle rules that affect multiple targets).

    It's all horrible and complex because like a lot of languages there's a manual listing the features but not much in the way of motivations for how or why you'd use them so you have to find that out by painful experience.

    It's also very difficult to address the warts and problems in (GNU) make because it's so critical to the build systems of so many packages that any breaking change could end up being a disaster for 1000s of packages used in your favorite linux distribution or even bits of Android and so on.

    So it's in a very constrained situation BECAUSE of it's "popularity".

    Make is also not a good way to logically describe your build/work - something like Meson would be better - where you can describe on the one hand what a "program" model was as a kind of class or interface and on the other an implementation of the many nasty operating system specific details of how to build an item of that class or type.

    Make has so many complex possible ways of operating (sometimes not all needed) that it can be hard to think about.

    The things that Make can do end up slowing it down as a parser such that for large builds the time to parse the makefile becomes significant.

    Make uses a dependency tree - when builds get large one starts to want an Inverted Dependency Tree. i.e. instead of working out what the aim of the build is and therefore what subcomponents need to be checked for changes we start with what changed and that gives us a list of actions that have to be taken. This sidesteps parsing of a huge makefile with a lot of build information in it that is mostly not relevant at all to the things that have changed. TUP is the first tool I know about that used this approach and having been burned hard by make and ninja when it comes to parsing huge makefiles (ninja is better but still slow) I think TUP's answer is the best https://gittup.org/tup/

  • Content based change detection with Make
    4 projects | news.ycombinator.com | 20 Sep 2022
    You might enjoy Tup[1] if you've not checked it out before.

    [1]: https://gittup.org/tup/

What are some alternatives?

When comparing proxychains and tup you can also consider the following projects:

torsocks - Library to torify application - NOTE: upstream has been moved to https://gitweb.torproject.org/torsocks.git

please - High-performance extensible build system for reproducible multi-language builds.

CrackMapExec - A swiss army knife for pentesting networks

Taskfile - Repository for the Taskfile template.

Tor - Tor protects your privacy on the Internet by hiding the connection between your Internet address and the services you use. (This is *not* the official repository.)

magma-nvim - Interact with Jupyter from NeoVim.

nipe - An engine to make Tor network your default gateway

just - 🤖 Just a command runner

sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.

gnumake-windows - Instructions for building gnumake.exe as a native windows application

impacket - Impacket is a collection of Python classes for working with network protocols.

doit - task management & automation tool