Showing 34 open source projects for "handshake"

View related business solutions
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 1
    HSD

    HSD

    Handshake Daemon & full node

    Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network's participants. Handshake is an experiment that seeks to explore those new ways in which the necessary tools to build a more decentralized internet. Services on the internet have become more centralized beginning in the 1990s, but do not fulfill the original decentralized vision of the internet.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    s2n-quic

    s2n-quic

    An implementation of the IETF QUIC protocol

    s2n-quic is AWS’s open-source implementation of the IETF QUIC transport protocol, written in Rust and designed for performance, security, and modern usage. QUIC is a UDP-based, multiplexed, encrypted transport layer that underpins HTTP/3 and addresses issues such as head-of-line blocking and faster handshake times compared to TCP+TLS. This library integrates with AWS’s s2n-tls or rustls for the TLS 1.3 handshake and leverages Rust’s memory and thread safety guarantees to deliver a robust implementation. It is built with configurability in mind—you can tune congestion control (like CUBIC), pacing, packet size discovery, and other advanced network behaviors. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    airgeddon

    airgeddon

    This is a multi-use bash script for Linux systems

    ..."DoS Pursuit mode" is available to avoid AP channel hopping (available also on DoS performed on Evil Twin attacks). Full support for 2.4Ghz and 5Ghz bands. Assisted WPA/WPA2 personal networks Handshake file and PMKID capturing. Cleaning and optimizing Handshake captured files. Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using a dictionary, brute-force, and rule-based attacks with aircrack, crunch and hashcat tools. Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools. ...
    Downloads: 50 This Week
    Last Update:
    See Project
  • 4
    MsQuic

    MsQuic

    Cross-platform, C implementation of the IETF QUIC protocol

    ...Optimized for maximal throughput and minimal latency. Asynchronous IO. Receive side scaling (RSS) support. UDP send and receive coalescing support. All packets are encrypted and handshake is authenticated with TLS 1.3. Parallel streams of (reliable and unreliable) application data. Exchange application data in the first round trip (0-RTT). Improved congestion control and loss recovery. Survives a change in the clients IP address or port. Stateless load balancing.
    Downloads: 6 This Week
    Last Update:
    See Project
  • SoftCo: Enterprise Invoice and P2P Automation Software Icon
    SoftCo: Enterprise Invoice and P2P Automation Software

    For companies that process over 20,000 invoices per year

    SoftCo Accounts Payable Automation processes all PO and non-PO supplier invoices electronically from capture and matching through to invoice approval and query management. SoftCoAP delivers unparalleled touchless automation by embedding AI across matching, coding, routing, and exception handling to minimize the number of supplier invoices requiring manual intervention. The result is 89% processing savings, supported by a context-aware AI Assistant that helps users understand exceptions, answer questions, and take the right action faster.
    Learn More
  • 5
    SMTP Tunnel Proxy

    SMTP Tunnel Proxy

    A high-speed covert tunnel that disguises TCP traffic as SMTP email

    SMTP Tunnel Proxy is a high-speed covert tunneling proxy that disguises regular TCP traffic as legitimate SMTP email communication to evade deep packet inspection (DPI) firewalls and censorship systems. It implements a SOCKS5 proxy interface on the client that wraps outbound traffic into an SMTP-like handshake (EHLO, STARTTLS, AUTH) and encrypted payload, making the session appear to DPI systems as a normal email exchange. The tool supports modern TLS encryption (STARTTLS) with HMAC-SHA256 authentication, per-user secrets, IP whitelisting, and multiplexed connections over a single tunnel. With a simple installer and systemd service setup, users can quickly deploy it on a Linux VPS as a tunneled access point, then connect from Windows, macOS, or Linux clients using auto-generated client packages. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Conscrypt

    Conscrypt

    Conscrypt is a Java Security Provider

    ...The provider focuses on contemporary protocol hygiene—up-to-date cipher suite selection, ALPN, session resumption, and hardened defaults—so Java servers and clients negotiate secure connections by construction. Because it builds on BoringSSL’s audited primitives and constant-time implementations, it reduces the risk of subtle side-channel issues while improving handshake and bulk crypto throughput. Conscrypt also exposes platform accelerations (like AES-GCM and ChaCha20-Poly1305) and supports features important to HTTP/2 and HTTP/3 stacks. Its goal is pragmatic: deliver a fast, well-maintained TLS provider that behaves like modern browsers and mobile stacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    websocket for Go

    websocket for Go

    Minimal and idiomatic WebSocket library for Go

    ...Fully passes the WebSocket autobahn-testsuite. Single dependency. JSON and protobuf helpers in the wsjson and wspb subpackages. Zero alloc reads and writes. Concurrent writes. Close handshake. net.Conn wrapper. Ping pong API. RFC 7692 permessage-deflate compression. Compile to Wasm. Transparent message buffer reuse with wsjson and wspb subpackages. Gorilla writes directly to a net.Conn and so duplicates features of net/http.Client. Gorilla requires registering a pong callback before sending a Ping. Compare godoc of nhooyr.io/websocket with gorilla/websocket side by side. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    ZMap

    ZMap

    ZMap is a fast single packet network scanner for network surveys

    ...ZMap currently has fully implemented probe modules for TCP SYN scans, ICMP, DNS queries, UPnP, BACNET, and can send a large number of UDP probes. If you are looking to do more involved scans, e.g., banner grab or TLS handshake, take a look at ZGrab 2, ZMap's sister project that performs stateful application-layer handshakes. ZDNS is a utility for performing fast DNS lookups, such as completing an A lookup for all names in a zone file, or collecting CAA records for a large number of websites. ZDNS contains its own recursive resolver and supports A, AAAA, ANY, AXFR, CAA, CNAME, DMARC, MX, NS, PTR, TXT, etc.
    Downloads: 27 This Week
    Last Update:
    See Project
  • 9
    Java WebSockets

    Java WebSockets

    A barebones WebSocket client and server implementation

    This repository contains a barebones WebSocket server and client implementation written in 100% Java. The underlying classes are implemented java.nio, which allows for a non-blocking event-driven model (similar to the WebSocket API for web browsers). The org.java_websocket.server.WebSocketServer abstract class implements the server-side of the WebSocket Protocol. A WebSocket server by itself doesn't do anything except establish socket connections though HTTP. After that it's up to your...
    Downloads: 8 This Week
    Last Update:
    See Project
  • Outbound sales software Icon
    Outbound sales software

    Unified cloud-based platform for dialing, emailing, appointment scheduling, lead management and much more.

    Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency.
    Learn More
  • 10
    Cloudflare-Socks5

    Cloudflare-Socks5

    CF-workers/pages proxy script: supports Vless-ws (tls) and Trojan-ws

    ...The project provides scripts that enable users to deploy proxy services locally without relying on external subscription providers, improving privacy and control over configuration data. It supports multiple transport modes including WebSocket with TLS, as well as optional encrypted handshake mechanisms like ECH-TLS, standard TLS, or even non-TLS configurations to adapt to different network restrictions. The system is designed with accessibility in mind, offering simplified setup processes that allow users to deploy nodes with minimal configuration, often requiring only a UUID or password. It also includes tools for generating optimized Cloudflare IP selections and supports multiple node formats for compatibility with clients like Clash and sing-box.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    tls SNI injector + Psiphon Free Server

    tls SNI injector + Psiphon Free Server

    VPN 4G ssl/tls sni Psiphon CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/vpn-4g-ssl-tls-sni-vpngate/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). 🔧 Máy chủ Psiphon3 miễn phí có hỗ trợ SNI tùy chỉnh và meek proxy ✅ Dùng để vượt tường lửa, kiểm duyệt mạng ⚙️ Cấu hình chuyên nghiệp, phù hợp với kỹ thuật viên và người yêu công nghệ 📡 Không cần root, không quảng cáo, hoạt động ổn định. 🚀 Free Psiphon3 + SNI Customization and meek proxy 🛡️ One...
    Downloads: 236 This Week
    Last Update:
    See Project
  • 12
    tls SNI injector iOS  Public Free Server
    TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). ## License This project includes some open-source components. This software is sold as a proprietary product. A license to use this software is granted only to those who have completed the payment process. For full license terms, please refer to the [Proprietary-License](./LICENSE) file.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/android-64-psimux-4g-0limit/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! This VPNGate server setup...
    Downloads: 96 This Week
    Last Update:
    See Project
  • 14
    NeuMan

    NeuMan

    Neural Human Radiance Field from a Single Video (ECCV 2022)

    ...It supports novel view and novel pose synthesis, enabling compositional results like transferring reconstructed humans into new scenes. The pipeline separates human/body and environment, learning consistent geometry and appearance to support animation. Demos showcase sequences such as dance and handshake, and the code provides guidance for running evaluations and rendering. As a research release, it serves both as a baseline and as a starting point for work on human-centric NeRFs. The emphasis is on practical reconstruction quality from minimal capture setups. Compositional outputs to blend humans and backgrounds. Novel view and novel pose synthesis from learned radiance fields.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Elymus

    Elymus

    Decentralized stack for paranoids-decentralizers

    ...It uses Repens protocol for dWeb sites (however you can access usual web2 sites through it, better use normal browser when doing it), developed to provide absolutely decentralized way to host and access frontends. Repens protocol utilizes Handshake Protocol as decentralized KV storage and content addressing system, IPFS as p2p caching system (user visits site, and caches its content, while seeding it through p2p network to next visitors, just like torrent but for websites), and Arweave/Sia/Hypercore Protocol as content anchoring networks (that will seed frontend when nobody has it in IPFS cache). ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    What happens when

    What happens when

    What happens when you type google into your browser and press enter?

    ...Rather than giving a high-level overview, the repository tries to break down every step in the process, from low-level events (keyboard press, OS events, keyboard interrupts), through OS-level handling (keyboard scan codes, key events), parsing, DNS lookup, networking (ARP, socket creation, TCP/TLS handshake), HTTP requests, browser behavior, HTML/CSS/JS parsing, rendering engine, GPU rendering, layout, to final drawing and user-visible output. The goal is to serve as a comprehensive resource for students and engineers to understand what happens under the hood, bridging from hardware and OS level up through network and application layers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Trojan-Go

    Trojan-Go

    A Trojan proxy written in Go

    ...For passive testing, the flow of the Trojan agreement is completely consistent with the characteristics and behavior of the HTTPS flow. HTTPS traffic accounts for more than half of current Internet traffic, and the traffic is confidential after TLS's handshake is successful. There is almost no feasible way to distinguish Trojan protocol traffic from it.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 18
    Pwnagotchi

    Pwnagotchi

    Deep Reinforcement learning instrumenting bettercap for WiFi pwning

    Pwnagotchi is an A2C-based “AI” powered by bettercap and running on a Raspberry Pi Zero W that learns from its surrounding WiFi environment in order to maximize the crackable WPA key material it captures (either through passive sniffing or by performing deauthentication and association attacks). This material is collected on disk as PCAP files containing any form of handshake supported by hashcat, including full and half WPA handshakes as well as PMKIDs. Instead of merely playing Super Mario or Atari games like most reinforcement learning based “AI” (yawn), Pwnagotchi tunes its own parameters over time to get better at pwning WiFi things in the real world environments you expose it to. To give hackers an excuse to learn about reinforcement learning and WiFi networking, and have a reason to get out for more walks.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 19
    WebSockets in C

    WebSockets in C

    WebSockets in C for Embedded Applications

    WIC is a C99 implementation of rfc6455 websockets designed for embedded applications. WIC decouples the websocket protocol from the transport layer. This makes it possible to use WIC over any transport layer assuming that you are prepared to do the integration work.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Serial Terminal Free

    Serial Terminal Free

    Transmitt-Receive data via Serial COM port

    ...Therefore, I decide to create my for my own, and share for everyone who need it. Because I don't know how many people will use my app, so I just make it simple, with default setting: - Parity : None - Stop bit: 1 - Data bit: 8 - Handshake: None - No DTR, RTS, newline, ending character... option. *** SPACE means it will be sent seperately. => It send/receive exactly what you want. (I will improve it if you guys find it interesting) Tested with USB to Serial UART module (connect TX and RX together) Cheer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    openCONFIGURATOR Eclipse Plugin

    openCONFIGURATOR Eclipse Plugin

    An eclipse plugin for the openCONFIGURATOR configuration tool

    Eclipse update site: http://sourceforge.net/projects/eclipse-plugin.openconf.p/files/update-site/ KNOWN ISSUE WITH THE UPDATE SITE DUE TO SOURCEFORGE ENCRYPTION POLICIES: If you experience problems with the SSL handshake during update please refer to http://gnuarmeclipse.github.io/blog/2017/01/29/plugins-install-issue/ Install via Eclipse marketplace: https://marketplace.eclipse.org/content/ethernet-powerlink-openconfigurator The project provides a plugin for the openCONFIGURATOR core library enabling the creation and configuration of a POWERLINK network (http://www.ethernet-powerlink.org/) in the Eclipse IDE (https://www.eclipse.org). ...
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 23
    mod_auth_trustheader

    mod_auth_trustheader

    apache-2.x module to get userid from header|environment|SSL variable

    Mostly copied from mod_auth_basic of apache-2.2. The basic-auth handshake was replaced by some code which gets the userid out of a customable variable. The variable could be anything ap_expr could read in authentication hook, e.g.: a header field, a httpd environment variable or an SSL environment variable. The syntax is the same known from RewriteCond of mod_rewrite: e.g.: %{HTTP:variable}, %{ENV:variable} or %{SSL:variable} No password is written into internal httpd variables. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Wi-Fi Cracking

    Wi-Fi Cracking

    Crack WPA Wi-Fi routers with Airodump-ng and Aircrack-ng Hashcat

    ...If you do not see an interface listed then your wireless card does not support monitor mode. Start listening to 802.11 Beacon frames broadcast by nearby wireless routers using your monitor interface. WPA/WPA2 uses a 4-way handshake to authenticate devices to the network. You don't have to know anything about what that means, but you do have to capture one of these handshakes in order to crack the network password. These handshakes occur whenever a device connects to the network. The final step is to crack the password using the captured handshake. If you have access to a GPU, it is highly recommended to use hashcat for password cracking.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 25

    FileCryptoBot

    Private anonymous file encryption based on manual RSA handshake

    FileCryptoBot is designed for secure exchange of confidendtial files accross the internet (email etc). Two users (sender and receiver) can securely exchange any file using AES encryption. FileCryptoBot encrypt any file with random AES key, which is encrypted by public RSA key. HOW TO USE IT: Receiver must use the FileCryptoBot to generate RSA key pair (Private Key and Public Key). Receiver will send the Public Key to Sender. Sender will encrypt the confidential file using the Public...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB