请大家收藏本页面,方便日后下载新版。 Bookmark this page to download the latest versions in the future.
https://github.com/getlantern/downloadTags | lantern censorship-circumvention censorship gfw |
Implementation | |
License | Public |
Platform |
🌷For the tiny version of GFWList, please visit tinylist project homepage. 🔨For source code stemmed from premier GFWList which is now being used for maintenance, please visit apollyon project.
china censorship-circumvention anticensorship gfwGoHop is a VPN implemented in golang, with innate encryption and obfuscation. The goal of this project is to escape from censorship and intelligent package inspection. There're already lots of VPN solutions like OpenVPN, L2TP with IPSec, PPTP and other commercial VPNs. But one key problem of these VPNs are that they're only built for anti-censorship instead of anti-GFW, of course, because their developers are not Chinese.
This software designed to bypass Deep Packet Inspection systems found in many Internet Service Providers which block access to certain websites. It handles DPI connected using optical splitter or port mirroring (Passive DPI) which do not block any data but just replying faster than requested destination, and Active DPI connected in sequence.
dpi deep-packet-inspection censorship-circumvention anticensorshipMy dev mirror of https://gitweb.torproject.org/n8fr8/orbot.git
censorship-circumvention anonymity security tor anticensorshipУтилита для определения типа блокировок сайтов из единого реестра запрещенной информации на стороне провайдеров Российской Федерации. Приложение автоматически отправляет статистику об используемом типе блокировки на сервер. Если вы используете сторонний DNS, тестируете разные способы обхода блокировок и запускаете программу для определения их эффективности, либо просто не хотите отправлять информацию о вашем провайдере на сервер, пожалуйста, пользуйтесь параметром --no-report.
dpi deep-packet-inspection dns censorship-circumventionPsiphon client and server components implemented in Go. These components provides core tunnel functionality, handling all aspects of evading blocking and relaying traffic through Psiphon. In the client, local proxies provide an interface for routing traffic through the tunnel. The client component does not include a UI and does not handle capturing or routing local traffic. These major aspects are handled by other parts of Psiphon client applications.
psiphon censorship-circumventionThe censorship tools are a collection of bash scripts for a) comparing DNS server answers to get the blacklist from the censored server, b) downloading censored URLs and c) other stuff like open all censored pages of a blacklist with a browser.
CensoRaser - A Censorship Analyzer to recognize, analyse and document censorship on the Internet.
Silence censorship. Automate the effect. Please read all installation instructions carefully before proceeding.
vpn ansible openvpn wireguard openconnect anyconnect shadowsocks stunnel tor ssh streisand censorshipOfficial Go language implementation of the Ethereum protocol supporting the original chain. Ethereum Classic (ETC) offers a censorship-resistant and powerful application platform for developers in parallel to Ethereum (ETHF), while differentially rejecting the DAO bailout. The simplest way to get started running a node is to visit our Releases page and download a zipped executable binary (matching your operating system, of course), then moving the unzipped file geth to somewhere in your $PATH. Now you should be able to open a terminal and run $ geth help to make sure it's working. For additional installation instructions please check out the Installation Wiki.
ethereum blockchain ethereum-classic[免翻墙工具]A free and open-source youtube video proxy script [Written in PHP]
youtube proxy webproxy phproxy phpproxy php-proxy youtubeproxy china proxy-server proxyscript proxytool videoproxy proxy-list gfw gfwlist firewall vpn lanternGlobaLeaks is an open source project aimed to create a worldwide, anonymous, censorship-resistant, distributed whistleblowing platform.
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to use the Internet anonymously and circumvent censorship. All connections to the Internet are forced to go through the Tor network. It leaves no trace on the computer you are using unless you ask it explicitly. It uses cryptographic tools to encrypt your files, emails and instant messaging.
operating-system linux-operating-system linux-distro linux-distribution live-os secure-osPersian Proxy is an anti-censorship software based on http protocol to help people to access free internet trough filtering systems :-)
proxyA layer that hide, redirect. forward, re-encrypt internet packet to keep VPN, Proxies and other p2p software hidden from Firewall. Free implementation for HTTP-Tunnel, UDP-Tunnel, port forwarding, port redirecting and packet re-encryption that can work in network data-link lay...
bypass-censorship bypass-firewall http-tunnel port-redirect udp-tunnelEthereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third party interference. These apps run on a custom built blockchain, an enormously powerful shared global infrastructure that can move value around and represent the ownership of property.
decentralized-platform decentralized-application blockchain cryptocurrency etherTails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. Tails relies on the Tor anonymity network to protect your privacy online. It encrypt and sign your emails and documents using the de facto standard OpenPGP either from Tails email client, text editor or file browser.
operating-system live-operating-system linux-distribution secure-operating-system privacyFrom time to time, GitHub receives requests from governments to remove content that has been declared unlawful in their local jurisdiction. Although we may not always agree with the choices of government actors, we may need to block content if we receive a valid request from a government official so that our users in that jurisdiction may continue to have access to GitHub to collaborate and build software. Whenever we block content at the request of a government, we will post the official request that led to the block in this repository.We are concerned about Internet censorship, and believe that transparency is a virtue. By posting the notices here, we can better inform the public about what content is being withheld from GitHub, and why. We post takedown notices here to document their potential to chill speech.
BitTorrent's DHT is probably one of the most resilient and censorship-resistant networks on the internet. PeerTweet uses this network to allow users to broadcast tweets to anyone who is listening. When you start PeerTweet, it generates a hash @33cwte8iwWn7uhtj9MKCs4q5Ax7B which is similar to your Twitter username (ex. @lmatteis). The difference is that you have entire control over what can be posted because only you own the private key associated with such address. Furthermore, thanks to the DHT, what you post cannot be stopped by any government or institution. Once you find other PeerTweet addresses you trust (and are not spam), you can follow them. This configures your client to store this user's tweets and broadcasts them to the DHT every once in a while to keep their feed alive. This cooperation of following accounts, allows for feeds to stay alive in the DHT network. The PeerTweet protocol also publishes your actions such as I just followed @919c.. or I just liked @9139.. and I just retweeted @5789... This allows the possibility for new users to find other addresses they can trust; if I trust the user @6749.. and they're following @9801.., then perhaps I can mark @9801.. as not spam. This idea of publicly tweeting about your actions also allows for powerful future crawling analysis of this social graph.
bittorrent dht microblogging decentralized p2p
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.