Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Earn up to 15% annual interest with Nexo.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Bypass your ISP's firewalls and connect to the internet!
Source: https://github.com/AlizerUncaged/HTTP-Injector
respite is a SSH/openVPN client that allows you to connect to the internet with custom injected HTTP Proxy headers.
This application requires
Java (https://www.java.com/en/download/) and
.Net 4.5 (https://www.microsoft.com/en-ph/download/details.aspx?id=42642 .Net 4.5 is already preinstalled in Windows 10).
There are many SSH and OpenVPN Server providers in the internet, one is https://www.tcpvpn.com
HTTP Proxy responses override (source code): https://github.com/AlizerDoesJava/respite-proxy-override
Please rate, any feedback is appreciated. ...
Lomalarga is a VPN-like service based on SSH and Linux.
Lomalarga is a port forwarding (VPN-like) service based on SSH & Linux. Based entirely on open source. The client is written in C# and the administration is based on Linux/lighttpd/PostgreSQL/PHP, with the UI written with Google Web Toolkit.
JWall is not just a java gui for iptables. JWall is a multi firewall management client. A secure rulebase can be built with graphical objects. Rulesets can be pushed to remote firewalls (via ssh). The remote firewall just needs to be Linux with sshd
TCP-Switch currently allows sharing one port for four protocols (SSH, HTTP, HTTPS, passive FTP).
Each protocol can be forwarded (tunnel) to a different <host:port>.
Future releases will allow much more controll, e.g. client IP/port, and other protocols
Infect is a network traffic classification tool, that classifies TCP protocols. The classification is based on ML techniques. Scen: Train/Recognize arbitrary protocols (SSH, HTTPS..), Detect policy violations (e.g. tunnels)