Showing 12 open source projects for "gfw"

View related business solutions
  • Stop Storing Third-Party Tokens in Your Database Icon
    Stop Storing Third-Party Tokens in Your Database

    Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.

    Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
    Try Auth0 for Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Pixeval

    Pixeval

    Wow. Yet another Pixiv client!

    ...The project was conceived in 2018. At that time, the api of the P station was written in Java. At that time, it could also be accessed by modifying the hosts method. After that, GFW The blocking strategy was upgraded, and DNS pollution was upgraded to SNI blocking, so I went to find information to understand the different blocking levels and blocking mechanisms of GFW. I started writing this project in the second half of 2019, which took about 3 months. (Actually, the realization of this project is partly inspired by Notsfsssf.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    FancySS

    FancySS

    fancyss is a project for bypassing the Great Firewall (GFW)

    ...The project provides a plugin suite (with “software center” integration) so that home routers can run proxy or tunneling tools (e.g. V2Ray) to circumvent firewall or censorship (“GFW” in the Chinese context). Because it integrates into the router’s firmware environment, fancyss automates configuration, routing, and firewall rules to minimize manual tinkering. It supports multiple architectures and firmware versions, though some submodules or variants (e.g. “fancyss_hnd”) are optimized for specific chipsets. The project also maintains offline packages for constrained environments and hardware support lists. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 3
    Trojan-Go

    Trojan-Go

    A Trojan proxy written in Go

    ...Shadowsoks' encryption protocol design makes the transmitted data package itself have almost no characteristics, and it looks similar to a completely random bitflow, which can indeed effectively bypass GFW in the early days. Contrary to Shadowsoks, Trojan does not use self-defined encryption protocols to hide itself. On the contrary, the clearly characterized TLS protocol (TLS/SSL) is used to make the flow look the same as the normal HTTPS website. TLS is a mature encryption system, and HTTPS uses TLS to carry HTTP traffic. For passive testing, the flow of the Trojan agreement is completely consistent with the characteristics and behavior of the HTTPS flow. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Luci App For Clash

    Luci App For Clash

    Luci interface for Clash Openwrt

    A rule-based custom proxy client for Openwrt based on Clash.
    Downloads: 8 This Week
    Last Update:
    See Project
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 5
    Trojan

    Trojan

    An unidentifiable mechanism that helps you bypass GFW

    Trojan is a lightweight C++ tool using the Trojan-GFW protocol, which masquerades proxy traffic as HTTPS to evade censorship. It supports forward and reverse proxy modes, password-based authentication, TLS encryption, IPv6, WebSocket transports, multiple connections, and DNS over HTTPS, and is compliant with RFC standards. Used primarily for bypassing network restrictions.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 6
    Kubernetes Vagrant Centos Cluster

    Kubernetes Vagrant Centos Cluster

    Setting up a distributed Kubernetes cluster along with Istio service

    Setting up a Kubernetes cluster and Istio service mesh with vagrantfile which consists of 1 master(also as node) and 3 nodes. You don't have to create complicated CA files or configurations. Because using virtual machines to setup a distributed Kubernetes cluster will bring a high load on your computer, I created the lightweight Cloud Native Sandbox using Docker to set up a standalone Kubernetes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Firefly

    Firefly

    A proxy software to help circumventing the Great Firewall

    Firefly is an agent used to access Great Firewall (GFW) blocked websites and applications. Under the default settings, Firefly only goes through VPN forwarding wall of IP traffic, IP wall straight. If you find a website or application you cannot access, Firefly flow mechanism can be built to distinguish between an error. In this case, you can choose to forward all traffic through the VPN, and then try again.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    gfw

    gfw.exe is a simple Garmin firmware manipulation utility.

    gfw.exe is a simple Garmin firmware manipulation utility. Basically, it can do just two things: 1) unpack GCD/RGN file as a bunch of .bin files, which represent sections/regions of the file. 2) pack a bunch of .bin files to GCD/RGN file
    Downloads: 7 This Week
    Last Update:
    See Project
  • 9

    NBCNightlyNewsDownloader

    下载NBC Nightly News

    类似iTunes的podcast功能,不过改为通过迅雷下载NBC Nightly News(http://www.msnbc.msn.com/id/3032619/)。1)需要安装.net framework2.0的环境。 2)中国大陆因为有GFW,有时候会下载失败,多试几次。
    Downloads: 0 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    Aimed to breakthrough GFW,(GFW is China's Internet censorship system).our project is similar to Tor but with specific structure to optimize anti-GFW functionality. 类似Tor的优化反封锁的开源翻墙软件,以避免中央服务器被封
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A high performance HTTP proxy server targeting at helping people to browse "restricted" websites behind a firewall on other limited environment (e.g. GFW). No client side softwar is needed.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 12
    Basic framework for creating networkable games.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB