Skip to main content

Proxy which uses simple time-based XOR scheme to make heuristic detection of underlying transmission impossible.

Project description

TCP proxy which masks (any) underlying protocols from trivial methods of detection. Masking is time-based (both sides need to have a synchronized clock, key changes by default every 5 minutes) and it’s not trivial to unmask given secure key on both ends. But IT’S NOT A SECURE ENCRYPTION and is NOT MEANT to be an encryption algorithm at all.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

barySSH-v0.1.2.tar.gz (2.9 kB view details)

Uploaded Source

File details

Details for the file barySSH-v0.1.2.tar.gz.

File metadata

  • Download URL: barySSH-v0.1.2.tar.gz
  • Upload date:
  • Size: 2.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for barySSH-v0.1.2.tar.gz
Algorithm Hash digest
SHA256 dba8d1545164254d8592565cbc74cdd3d78155550df210ea27c2a43f47a93e12
MD5 6e336dc316aedd061bf946153b1e0ce5
BLAKE2b-256 955976d69115a38b80d5b17f2a0f917da3825a6316e771a5558aa5c48acbf837

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page