Proxy which uses simple time-based XOR scheme to make heuristic detection of underlying transmission impossible.
Project description
TCP proxy which masks (any) underlying protocols from trivial methods of detection. Masking is time-based (both sides need to have a synchronized clock, key changes by default every 5 minutes) and it’s not trivial to unmask given secure key on both ends. But IT’S NOT A SECURE ENCRYPTION and is NOT MEANT to be an encryption algorithm at all.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
barySSH-v0.1.2.tar.gz
(2.9 kB
view details)
File details
Details for the file barySSH-v0.1.2.tar.gz
.
File metadata
- Download URL: barySSH-v0.1.2.tar.gz
- Upload date:
- Size: 2.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | dba8d1545164254d8592565cbc74cdd3d78155550df210ea27c2a43f47a93e12 |
|
MD5 | 6e336dc316aedd061bf946153b1e0ce5 |
|
BLAKE2b-256 | 955976d69115a38b80d5b17f2a0f917da3825a6316e771a5558aa5c48acbf837 |