-
Updated
Aug 3, 2020 - C++
#
i2p
Here are 105 public repositories matching this topic...
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is a mirror of the official Monotone repository.
-
Updated
Aug 1, 2020 - Java
Feature-filled Bittorrent client based on the Azureus open source project
-
Updated
Aug 2, 2020 - Java
Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.
tunnel
proxy
mitm
tor
sniffer
reverse-proxy
shadowsocks
v2ray
network-visualization
gfw
i2p
port-knocking
tunnelvpn
protocol-analysis
network-spoof
network-poison
network-forensic
-
Updated
Dec 30, 2019
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org
open-source
security
encryption
irc
debian
virtualization
anonymity
tor-network
i2p
physical-isolation
hide-real-ip
privacy-protection
dns-leak-prevention
-
Updated
Aug 6, 2020 - Shell
infrastructure
golang
data
storage
ethereum
ipfs
swarm
pinning
i2p
temporal
ipns
ipfs-cluster
ethereum-swarm
-
Updated
Jun 1, 2020 - Go
Android application for Internet privacy and security
-
Updated
Aug 6, 2020 - Java
majestrate / XD
Official repository of OnionCat, the VPN adapter for Tor and I2P.
-
Updated
Jun 15, 2020 - C
Denarius [$D] is a PoW/PoS Hybrid Cryptocurrency with Tribus a new PoW Hashing Algo built specifically for D, one of a kind hybrid masternodes called Fortuna Stakes, atomic swaps, staking, mining, IPFS, optional Native Tor and I2P, and much more!
crypto
bitcoin
ipfs
decentralized
blockchain
d
p2p
tor
cryptocurrency
i2p
blockchain-technology
altcoins
stake
satoshi
masternodes
atomic-swaps
denarius
tribus-pow
pos-hybrid
tribus-algorithm
-
Updated
Jul 2, 2020 - C
I2P router implementation in Rust
-
Updated
Dec 16, 2019 - Rust
A curated list of awesome I2P implementations, libraries, resources, projects, and shiny things. I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
-
Updated
Nov 3, 2019
Library to enable decentralized web requests
-
Updated
Aug 3, 2020 - C++
Obscurix is a live operating system based on Arch Linux that is heavily configured for privacy, security and anonymity. It safely forces all traffic through the Tor network, has support for other networks such as I2P and is hardened a lot for security. All data is lost at shutdown as it is run from RAM.
-
Updated
Feb 20, 2020 - Shell
GOST R 34.11-2012 algo, GOST R 34.10-2012 signature
-
Updated
Nov 28, 2019 - C++
Library for TUN and TAP devices over I2P in Go Applications
-
Updated
Jul 1, 2020 - Go
-
Updated
May 24, 2020 - C++
A list of basic privacy-focused enhancements
-
Updated
Jun 30, 2020
I2P in Private Browsing mode for Firefox, built using Webextensions and Contextual Identities
firefox
privacy
bittorrent
webextensions
i2p
i2pd
i2p-browser
i2p-browsing
i2p-sites
i2p-domains
contextual-identities
router-console
i2p-proxies
-
Updated
Jul 13, 2020 - JavaScript
Improve this page
Add a description, image, and links to the i2p topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the i2p topic, visit your repo's landing page and select "manage topics."

