ssh-over-ssm
arch-privoxyvpn
Our great sponsors
ssh-over-ssm | arch-privoxyvpn | |
---|---|---|
2 | 7 | |
718 | 97 | |
- | - | |
3.2 | 5.6 | |
3 months ago | 19 days ago | |
Shell | Shell | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ssh-over-ssm
- AWS EC2 Key-Pair
-
Accessing AWS EC2 via SSH without exposing the SSH
I use SSH over SSM: https://github.com/elpy1/ssh-over-ssm
arch-privoxyvpn
- Gluetun (VPN for a few containers) Alternative?
-
[Discuss] When should I worry about my Hetzner account?
Today for some reason, arch-privoxyvpn failed me. I received an abuse email from Hetzner regarding one of file I was seeding.
- Socks5 server using a VPN connection question
-
Transmission Container through Wireguard Help
It sounds like you're looking for something like this, available in community apps. You would then create a custom docker network, and assign Transmission's network to the privoxyvpn container (and move the ports from transmission to privoxy)
-
Please, help me understand how my IP was leaked
First, a bit about my setup. Everything is in Docker. I have a qbittorrent container, which tunnels through binhex's privoxyvpn container, which is connected to ExpressVPN. Somehow though, when I visit https://iknowwhatyoudownload.com using my normal IP, they're able to identify a sample of the torrents I've downloaded over the last 2 weeks via this setup (I don't have a torrent client installed anywhere else and I know these specific items were indeed downloaded through my qbittorrent.)
-
VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN, DNS over TLS, with a few proxy servers built-in.
I'm currently using binhex/arch-privoxyvpn. Is there a reason why I should use Gluetun instead?
- Suggestions: dockerized VPN client (wireguard/openvpn) that is exposed so that i can connect to it via proxy (sock5/http) on local devices
What are some alternatives?
terraform-aws-ssm-parameters - Terraform module creating encrypted and non-encrypted AWS SSM parameters
gluetun - VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
spc - A scp wrapper to manage across multiple remote machines
compose-transmission-wireguard - Run Transmission through a WireGuard tunnel with Docker Compose.
aws-gate - Better AWS SSM Session manager CLI client
docker-windscribe-socks-server - Containerizes a SOCKS5 proxy server with traffic tunneled through Windscribe's VPN service
unlimited-tethering - Bypass tethering caps or throttling on cell phone unlimited data plans. Potentially cancel your internet and route your whole home though your unlimited data plan.
arch-delugevpn - Docker build script for Arch Linux base with Deluge, Privoxy and OpenVPN
awsssmchaosrunner - Amazon's light-weight library for chaos engineering on AWS. It can be used for EC2 and ECS (with EC2 launch type).
arch-plexpass - Docker build script for Arch Linux base with Plex Pass Media Server installed
ssm-multi-tmux - Run an interactive command on EC2 instances using AWS SSM in synchronised tmux panes
openvpn-client