Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

pacparser

Compare

  Analyzed about 13 hours ago

pacparser is a library to parse proxy auto-config (PAC) files. Proxy auto-config files are a vastly used proxy configuration method these days. Web browsers can use a PAC file to determine which proxy server to use or whether to go direct for a given URL. PAC files are written in JavaScript and can ... [More] be programmed to return different proxy methods (e.g. "PROXY proxy1:port; DIRECT") depending upon URL, source IP address, protocol, time of the day etc. PAC files introduce a lot of possibilities. Look at the wikipedia link above to find out more about them. Needless to say, PAC files are now a widely accepted method for proxy configuration management and companies all over are using them in corporate environment. Almost all popular web browsers support PAC files. The idea behind pacparser is to make it easy to add this PAC file parsing capability to any program (C and python supported right now). It comes as a shared C library and a python module which can be used to make any C or python program PAC scripts intelligent. Some very useful targets could be popular web software like wget, curl and python-urllib. Please look at the README and other links for more information. Usage ExamplesUsing it with python: >>> import pacparser >>> pacparser.init() >>> pacparser.parse_pac('examples/wpad.dat') >>> pacparser.find_proxy('http://www.google.com', 'www.google.com') 'PROXY proxy1.manugarg.com:3128; PROXY proxy2.manugarg.com:3128; DIRECT' >>> pacparser.find_proxy('http://www2.manugarg.com', 'www2.manugarg.com') 'DIRECT' >>> pacparser.cleanup() >>>Using it in C: manugarg@hobbiton:~$ cat pactest.c #include int pacparser_init(); int pacparser_parse_pac(char* pacfile); char *pacparser_find_proxy(char *url, char *host); void pacparser_cleanup(); int main(int argc, char* argv[]) { char *proxy; pacparser_init(); pacparser_parse_pac(argv[1]); proxy = pacparser_find_proxy(argv[2], argv[3]); printf("%s\n", proxy); pacparser_cleanup(); } manugarg@hobbiton:~$ gcc -o pactest pactest.c -lpacparser manugarg@hobbiton:~$ ./pactest wpad.dat http://www.google.com www.google.com PROXY proxy1.manugarg.com:3128; PROXY proxy2.manugarg.com:3128; DIRECT [Less]

83.4K lines of code

0 current contributors

17 days since last commit

1 users on Open Hub

Low Activity
0.0
 
I Use This

LayerProx

Compare

  Analyzed about 19 hours ago

encrypted programmable traffic obfuscation proxy

845K lines of code

0 current contributors

5 months since last commit

1 users on Open Hub

Very Low Activity
0.0
 
I Use This
Licenses: No declared licenses

Angie

Compare

  Analyzed about 1 hour ago

Angie is an efficient, powerful and scalable web server, that was forked from nginx by some of its former core devs, with intention to extend functionality far beyond original version. Angie is a drop-in replacement for nginx, so you can use existing nginx configuration without major changes.

266K lines of code

0 current contributors

22 days since last commit

1 users on Open Hub

Moderate Activity
5.0
 
I Use This

proxytunnel

Compare

  Analyzed about 10 hours ago

Proxytunnel is a program that connects stdin and stdout to an origin server somewhere in the Internet through an industry standard HTTPS proxy.This will allow you for example to access SSH servers when you normally only have http(s) access.

2.75K lines of code

1 current contributors

24 days since last commit

1 users on Open Hub

Low Activity
5.0
 
I Use This
Licenses: No declared licenses

Istio

Compare

  Analyzed about 19 hours ago

Istio is an open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data.

111K lines of code

280 current contributors

1 day since last commit

1 users on Open Hub

High Activity
0.0
 
I Use This

SIMProx

Compare

Claimed by Grid Protection Alliance (GPA) Analyzed 8 minutes ago

SNMP Proxy Service for Agent Forwarding and Database Operation Targets

1.12M lines of code

0 current contributors

1 day since last commit

1 users on Open Hub

Very Low Activity
0.0
 
I Use This

torsocks

Compare

  Analyzed about 22 hours ago

Torsocks: use socks-friendly applications with TorTorsocks allows you to use most socks-friendly applications in a safe way with Tor. It ensures that DNS requests are handled safely and explicitly rejects UDP traffic from the application you're using. Torsocks is known to work on Linux and some ... [More] distributions of Unix. Mac OSX is currently not supported. Once you have installed torsocks, just launch it like so: usewithtor [application]So, for example you can use ssh to a some.ssh.com by doing: usewithtor ssh username @ some.ssh.com or launch pidgin by doing: usewithtor pidgin An alternative to usewithtor is torsocks: torsocks pidginThe tables below list applications that usewithtor/torsocks will send through Tor. At the moment a 100% guarantee of safe interoperability with Tor can only be given for a few of them. This is because the operation of the applications and the data they transmit has not been fully researched, so it is possible that a given application can leak user/system data at a level that neither Tor nor torsocks can control. The following administrative applications are known to be compatible with usewithtor: Application 100% Safe DNS Comments ssh M Y Potential for identity leaks through login. telnet M Y Potential for identity leaks through login and password. svn M Y gpg M Y gpg --refresh-keys works well enough. The following messaging applications are known to be compatible with usewithtor: Application 100% Safe DNS Comments pidgin M Y Potential for identity leaks through login and password. kopete M Y Potential for identity leaks through login and password. konversation M Y Potential for identity leaks through login and password. irssi M Y Potential for identity leaks through login and password. silc M Y Potential for identity leaks through login and password. The following email applications are known to be compatible with usewithtor: Application 100% Safe DNS Comments claws-mail M Y http://rorschachstagebuch.wordpress.com/2008/11/02/claws-mail-zweit-profil-fur-tor/ thunderbird N Y Probable identity leaks through javascript, mail headers. Potential for identity leaks through login, password. The following file transfer applications are known to be compatible with usewithtor: Application 100% Safe DNS Comments wget N Y Probable identity leaks through http headers. Privoxy and polipo a better solution. ftp M Y Passive mode works well generally. Table legend: DNS: DNS requests safe for Tor? N - The application is known to leak DNS requests when used with torsocks. Y - Testing has shown that application does not leak DNS requests. 100% Safe: Fully verified to have no interoperability issues with Tor? N - Anonymity issues suspected, see comments column. M - Safe enough in theory, but either not fully researched or anonymity can be compromised through indiscreet use (e.g. email address, login, passwords). Y - Application has been researched and documented to be safe with Tor.Differences between torsocks and tsocksA complete history of changes is maintained in the Changelog. The initial working copy of torsocks was obtained through the following steps in June 2008: Tsocks was downloaded from the project's sourceforge repository. All patches listed at TSocksPatches in March 2008 were applied. In particular, the patch from Total Information Security that hooks DNS requests and passesthem to Tor. The original link for this patch is now dead and the authors are no longer available at the email addresses supplied in the patch's source. Weasel's getpeername() patch and some build-related patches from Ruben Garcia were applied. All references to tsocks in the project source files were renamed to torsocks. The project was then migrated to an automake/autoconf build system. To help with reconstructing the above steps a list of applied patches is available in the patches subdirectory of the torsocks source tree. Enhancements unique to torsocksThe first release of torsocks contained the following enhancements: Torifying reverse dns requests through gethostbyaddr() Blocking of UDP traffic from sendto() and its variants. Use of Tor-friendly defaults if no configuration file available. The addition of all RFC defined private address ranges to the default configuration. [Less]

8.94K lines of code

2 current contributors

7 months since last commit

1 users on Open Hub

Very Low Activity
0.0
 
I Use This
Tags proxy socks tor

skipper-zalando

Compare

  Analyzed about 2 hours ago

An HTTP router and reverse proxy for service composition, including use cases like Kubernetes Ingress

109K lines of code

0 current contributors

2 days since last commit

1 users on Open Hub

High Activity
0.0
 
I Use This
Licenses: No declared licenses

Smart Cache

Compare

  Analyzed 2 minutes ago

Smart Cache is a fast pure Java HTTP proxy server with offline browsing support. It has URL blocking, URL rewriting. Cached files has not headers inside and cache directory structure copies closely remote server. Supports also large caches.

10.8K lines of code

0 current contributors

almost 4 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This

mulk

Compare

  Analyzed 4 months ago

Multi-connection command line tool to download Internet sites. Similar to wget and cURL, but it manages up to 50 parallel links. Main features are: recursive fetching, Metalink retrieving, segmented download and image filtering by width and height.

94K lines of code

0 current contributors

about 11 years since last commit

1 users on Open Hub

Activity Not Available
5.0
 
I Use This