{"id":37010875,"url":"https://github.com/jery0843/torforge","last_synced_at":"2026-01-21T02:00:56.566Z","repository":{"id":329812969,"uuid":"1120724184","full_name":"Jery0843/TorForge","owner":"Jery0843","description":"🧅 Experimental transparent Tor proxy with AI-powered circuit selection, post-quantum encryption, and leak protection. Route all system traffic through Tor with zero configuration.","archived":false,"fork":false,"pushed_at":"2026-01-13T07:25:21.000Z","size":280,"stargazers_count":11,"open_issues_count":0,"forks_count":1,"subscribers_count":0,"default_branch":"main","last_synced_at":"2026-01-13T10:31:42.982Z","etag":null,"topics":["ai","anonymity","censorship-circumvention","encryption","golang","iptables","kill-switch","linux","network-security","post-quantum","privacy","proxy","security","tor","transparent-proxy"],"latest_commit_sha":null,"homepage":"https://torforge.jerome.co.in","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Jery0843.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null},"funding":{"ko_fi":"andres__","buy_me_a_coffee":"0xJerry"}},"created_at":"2025-12-21T20:13:49.000Z","updated_at":"2026-01-13T07:25:25.000Z","dependencies_parsed_at":null,"dependency_job_id":null,"html_url":"https://github.com/Jery0843/TorForge","commit_stats":null,"previous_names":["jery0843/torforge"],"tags_count":2,"template":false,"template_full_name":null,"purl":"pkg:github/Jery0843/TorForge","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jery0843%2FTorForge","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jery0843%2FTorForge/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jery0843%2FTorForge/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jery0843%2FTorForge/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Jery0843","download_url":"https://codeload.github.com/Jery0843/TorForge/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Jery0843%2FTorForge/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28622472,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-20T23:49:58.628Z","status":"online","status_checked_at":"2026-01-21T02:00:08.227Z","response_time":86,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ai","anonymity","censorship-circumvention","encryption","golang","iptables","kill-switch","linux","network-security","post-quantum","privacy","proxy","security","tor","transparent-proxy"],"created_at":"2026-01-14T01:00:32.991Z","updated_at":"2026-01-21T02:00:56.556Z","avatar_url":"https://github.com/Jery0843.png","language":"Go","readme":"\u003cdiv align=\"center\"\u003e\n\n# 🧅 TorForge\n\n**Experimental Transparent Tor Proxy with AI-Powered Security**\n\n[![Go Version](https://img.shields.io/badge/Go-1.21+-00ADD8?style=flat\u0026logo=go)](https://golang.org)\n[![License](https://img.shields.io/badge/License-MIT-green.svg)](LICENSE)\n[![Platform](https://img.shields.io/badge/Platform-Linux-orange.svg)](https://linux.org)\n\n[![Speed](https://img.shields.io/badge/Speed-20Mbps+-brightgreen.svg)]()\n\n*Route all system traffic through Tor with experimental security features*\n\n\u003c/div\u003e\n\n---\n\n## 🚀 Overview\n\nTorForge is a transparent Tor proxy that routes all system traffic through the Tor network. Unlike traditional Tor setups, TorForge operates at the kernel level using iptables, ensuring zero application configuration and complete traffic capture.\n\n### Key Highlights\n- **Zero-config transparent proxying** - Works with any application\n- **Pure Go codebase** - No external ML dependencies\n- **10 internal packages** - Modular architecture\n- **AI-powered optimization** - Smart circuit selection and split-tunneling\n- **Post-quantum ready** - CRYSTALS-Kyber768 encryption\n\n---\n\n## ✨ Features\n\n### Core Functionality\n| Feature | Description |\n|---------|-------------|\n| **Transparent Proxy** | All TCP/DNS traffic automatically routed through Tor |\n| **Kill Switch** | Default DROP policy prevents any IP leaks |\n| **IPv6 Routing** | IPv6 traffic routed through Tor (with kill switch) |\n| **ICMP Blocking** | Ping requests blocked to prevent leaks |\n| **Multi-Circuit** | Concurrent circuit support for better performance |\n| **Circuit Racing** | Race 5 circuits on startup, use fastest (`--race`) |\n| **Auto-Rotation** | Automatically change exit IP on schedule |\n\n### 🔐 Experimental Security\n| Feature | Description |\n|---------|-------------|\n| **Post-Quantum Encryption** | CRYSTALS-Kyber768 encrypts locally saved data (ML weights, cache) |\n| **Steganography Mode** | Uses obfs4 transport with streaming-pattern headers |\n| **Decoy Traffic** | Injects fake requests to frustrate traffic analysis |\n| **Dead Man's Switch** | Panic key for instant emergency shutdown with trace wiping |\n\n\u003e [!WARNING]\n\u003e **Browser Fingerprinting:** TorForge protects your network traffic but does NOT prevent browser fingerprinting. Websites can still identify you through screen resolution, fonts, canvas, and other browser characteristics. For anonymous web browsing, use **Tor Browser instead of TorForge** (not together-running Tor Browser with TorForge active causes Tor-over-Tor issues). TorForge is designed for non-browser apps (curl, wget, system-wide protection).\n\n### 🤖 AI-Powered\n| Feature | Description |\n|---------|-------------|\n| **Smart Circuit Selection** | Neural network learns optimal exit nodes based on latency/bandwidth |\n| **Split-Tunnel Learning** | Automatic routing decisions based on app behavior |\n| **Performance Optimization** | Adapts to network conditions in real-time |\n\n#### 🧠 Neural Network Architecture\n\nTorForge uses a **pure-Go neural network** (no external ML dependencies) for exit node quality prediction:\n\n```\nInput Layer (6)     Hidden Layer 1 (16)    Hidden Layer 2 (8)    Output (1)\n    ┌─┐                  ┌─┐                    ┌─┐              ┌─┐\n    │L│─────────────────▶│ │────────────────────│ │─────────────▶│Q│\n    │B│  Latency Norm    │ │  ReLU Activation   │ │  Sigmoid     │ │\n    │S│  Bandwidth Norm  │ │                    │ │              │ │\n    │T│  Success Rate    │ │  Xavier Init       │ │              │ │\n    │N│  Time of Day     │ │  Backpropagation   │ │              │ │\n    │R│  Sample Count    │ │                    │ │              │ │\n    └─┘  Recency         └─┘                    └─┘              └─┘\n```\n\n| Component | Specification |\n|-----------|---------------|\n| **Architecture** | 3-layer MLP (6→16→8→1) |\n| **Activations** | ReLU (hidden) + Sigmoid (output) |\n| **Training** | Online learning with backpropagation |\n| **Batch Size** | 32 samples |\n| **Learning Rate** | 0.01 |\n| **Initialization** | Xavier/Glorot |\n| **Dependencies** | **Zero** external ML libraries |\n\n#### 📊 Model Performance\n\n| Samples | Confidence | Accuracy | Actions |\n|---------|------------|----------|---------|\n| \u003c 32 | 0% | — | Model not trained |\n| 32-64 | 13-26% | ~60% | Training started |\n| 64-250 | 26-100% | ~80% | Learning patterns |\n| **250+** | **100%** | **~95%+** | **Active exclusions enabled** |\n\n#### ⚡ Required Samples\n\n| Milestone | Samples | Time (1-min rotation) | What Happens |\n|-----------|---------|----------------------|--------------|\n| First training | 32 | ~16 min | Model begins learning |\n| Good accuracy | 100 | ~50 min | Reliable predictions |\n| **Full confidence** | **250** | **~2 hours** | **Exit exclusions active** |\n| Optimal | 500+ | ~4 hours | Excellent accuracy |\n\n#### ✅ Advantages\n\n| Advantage | Description |\n|-----------|-------------|\n| **Pure Go** | No Python, TensorFlow, or external ML dependencies |\n| **Continuous Learning** | Model improves with every session |\n| **Persistent Weights** | Training carries across restarts |\n| **Privacy-First** | All data stays local, no external APIs |\n| **Fast Inference** | \u003c 1ms per prediction |\n| **TTL Re-evaluation** | Bad exits get fresh chance after 1 hour |\n| **Anonymity Preserved** | Max 5 exclusions to avoid fingerprinting |\n\n#### 🔧 AI Commands\n\n```bash\n# Test neural network\ntorforge ai test\n\n# View AI statistics  \ntorforge ai stats\n\n# Reset learned data\ntorforge ai reset\n\n# Add domain to bypass\ntorforge ai bypass \u003cdomain\u003e\n\n# Mark domain as sensitive (always Tor)\ntorforge ai sensitive \u003cdomain\u003e\n```\n\n### 🌉 Censorship Circumvention\n| Feature | Description |\n|---------|-------------|\n| **Bridge Auto-Discovery** | Finds working bridges when Tor is blocked |\n| **Censorship Detection** | Automatically detects if Tor is being blocked |\n| **Pluggable Transports** | obfs4, Snowflake, meek-azure support |\n\n---\n\n## 📦 Installation\n\n### Prerequisites\n```bash\n# Debian/Ubuntu/Kali\nsudo apt update\nsudo apt install -y tor iptables make gcc\n\n# Fedora/RHEL\nsudo dnf install tor iptables make gcc\n\n# Arch Linux\nsudo pacman -S tor iptables make gcc\n```\n\n### Build from Source\n```bash\ngit clone https://github.com/jery0843/torforge.git\ncd torforge\nmake build\n```\n\n### Install System-wide\n```bash\nsudo make install\n```\n\n### Enable Auto-Start (systemd)\n```bash\nsudo torforge install-systemd\nsudo systemctl enable torforge\n```\n\n### Uninstall\n```bash\n# Stop TorForge if running\nsudo torforge stop\n\n# Remove binary\nsudo rm /usr/local/bin/torforge\n\n# Remove configuration\nsudo rm -rf /etc/torforge\n\n# Remove runtime data\nsudo rm -rf /var/lib/torforge\n\n# Remove logs\nsudo rm -rf /var/log/torforge\n\n# Remove systemd service (if installed)\nsudo systemctl disable torforge\nsudo rm /etc/systemd/system/torforge.service\nsudo systemctl daemon-reload\n```\n\n---\n\n## 🎯 Quick Start\n\n```bash\n# Start with default settings\nsudo torforge tor\n\n# Start with 8 circuits\nsudo torforge tor -n 8\n\n# Check status\nsudo torforge status\n\n# Request new exit IP\nsudo torforge new-circuit\n\n# Stop and restore network\nsudo torforge stop\n```\n\n---\n\n## 📖 Command Reference\n\n### Available Commands\n\n| Command | Description |\n|---------|-------------|\n| `tor` | Start transparent Tor proxy |\n| `status` | Show live status dashboard |\n| `stop` | Stop proxy and restore network |\n| `new-circuit` | Request new Tor identity |\n| `ai` | Manage AI-powered features |\n| `app` | Run single command through Tor |\n| `test` | Run leak detection tests |\n| `install-systemd` | Install as system service |\n\n---\n\n### `torforge tor` - Start Proxy\n\n```bash\nsudo torforge tor [flags]\n```\n\n| Flag | Short | Description | Default |\n|------|-------|-------------|---------|\n| `--circuits` | `-n` | Number of concurrent circuits | 4 |\n| `--post-quantum` | | Enable post-quantum encryption for local data | off |\n| `--pq-password` | | Password for decryptable file encryption | none |\n| `--rotate-circuit` | | Auto-rotate every N minutes | 0 |\n| `--race` | | Race circuits on startup, use fastest | off |\n| `--race-circuits` | | Number of circuits to race | 5 |\n| `--decoy-traffic` | | Generate N% fake traffic (0-100) | 0 |\n| `--stego` | | Steganography mode (mimic streaming) | off |\n| `--panic-key` | | Dead man's switch key (e.g., F12) | none |\n| `--auto-bridge` | | Auto-discover bridges if blocked | off |\n| `--exit-nodes` | `-e` | Preferred exit countries (US,DE) | any |\n| `--bypass` | `-b` | Bypass patterns (*.local) | none |\n| `--speed` | `-s` | Bandwidth limit (100Mbps) | none |\n| `--no-kill-switch` | `-k` | Disable kill switch | off |\n| `--use-system-tor` | `-S` | Use existing Tor instance | off |\n| `--daemon` | `-d` | Run as background daemon | off |\n| `--no-ai` | | Disable AI exit selection (paranoid mode) | off |\n| `--keep-root` | | Stay root, don't drop privileges | off |\n\n#### Examples\n\n```bash\n# Basic usage\nsudo torforge tor -n 8\n\n# Maximum security\nsudo torforge tor --post-quantum --rotate-circuit 10 -n 8\n\n# Anti-analysis mode\nsudo torforge tor --decoy-traffic 50 --stego -n 8\n\n# With panic key\nsudo torforge tor --panic-key F12 -n 8\n\n# Full featured\nsudo torforge tor \\\n  --post-quantum \\\n  --rotate-circuit 5 \\\n  --decoy-traffic 30 \\\n  --stego \\\n  --panic-key F12 \\\n  -n 8\n```\n\n---\n\n### `torforge status` - Live Dashboard\n\n```bash\nsudo torforge status\n```\n\nOutput:\n```\n🧅 TorForge Status\n━━━━━━━━━━━━━━━━━━\n   Status:   ✅ ACTIVE\n   Exit IP:  185.220.101.15\n   Circuits: 14 active\n\nCommands:\n   torforge new-circuit  → Get new exit IP\n   torforge stop         → Stop TorForge\n```\n\n---\n\n### `torforge ai` - AI Management\n\n```bash\n# View learning statistics\nsudo torforge ai stats\n\n# Reset learned data\nsudo torforge ai reset\n\n# Add domain to bypass list (direct connection)\nsudo torforge ai bypass streaming.example.com\n\n# Mark domain as sensitive (always Tor)\nsudo torforge ai sensitive secret.example.com\n```\n\n---\n\n### `torforge app` - Single App Through Tor\n\n```bash\n# Run Firefox through Tor\nsudo torforge app firefox\n\n# Run curl through Tor\nsudo torforge app curl https://check.torproject.org/api/ip\n\n# Run any command\nsudo torforge app wget https://example.com/file.zip\n```\n\n---\n\n### `torforge test` - Leak Detection\n\n```bash\nsudo torforge test\n```\n\nPerforms comprehensive tests:\n- DNS leak detection\n- IP leak detection\n- WebRTC leak detection\n- IPv6 leak detection\n\n---\n\n## 🔐 Security Features\n\n### Post-Quantum Encryption\n\nUses **CRYSTALS-Kyber768** from Cloudflare's CIRCL library to encrypt locally stored data:\n- Encrypts session stats (exit IPs used, AI recommendations)\n- NIST Level 3 security (192-bit quantum resistant)\n- Optional password for decryptable files (`--pq-password`)\n\n\u003e **Note:** This does NOT encrypt network traffic (Tor already handles that). It protects your local data at rest.\n\n**With password:**\n```bash\nsudo torforge tor --post-quantum --pq-password \"MySecret\" -n 8\n# Files can be decrypted later with same password\n```\n\n```\n🧅 TorForge Active\n   🔐 Post-Quantum: CRYSTALS-Kyber768 ACTIVE\n   📊 NIST Level: 3 | Key ID: a1b2c3d4\n   🔑 Password encryption: ENABLED\n```\n\n---\n\n### Dead Man's Switch\n\nPress the configured key in terminal:\n\n```\n🚨 PANIC KEY PRESSED!\n🚨 DEAD MAN'S SWITCH TRIGGERED - EMERGENCY SHUTDOWN\n🚨 KILLING ALL NETWORK CONNECTIONS...\n   → Flushing iptables\n   → Killing all sockets\n   → Killing Tor process\n   → Clearing browser caches\n   → Wiping RAM caches\n   → Clearing shell history\nemergency exit - all connections terminated\n```\n\n---\n\n### Protection Matrix\n\n| Threat Vector | Protection |\n|---------------|------------|\n| TCP IP Leak | iptables forces all TCP through Tor |\n| UDP IP Leak | UDP blocked except Tor DNS |\n| IPv6 IP Leak | IPv6 routed through Tor (kill switch blocks leaks) |\n| ICMP Leak | Ping blocked |\n| DNS Leak | DNS forced through Tor |\n| Traffic Analysis | Decoy traffic + obfs4 obfuscation |\n| Quantum Attack | Post-quantum encryption |\n| Kill Switch Fail | Default DROP policy |\n| Emergency | Dead man's switch |\n\n---\n\n### 🔒 Privilege Separation Model\n\nTorForge uses a multi-layer privilege separation approach:\n\n| Component | User | Purpose |\n|-----------|------|---------|\n| **TorForge** | `SUDO_USER` (your user) | Main process, drops after iptables setup |\n| **Tor daemon** | `debian-tor` | Network operations (if user exists) |\n| **iptables** | root | Only during setup and cleanup (via sudo) |\n\n#### How It Works\n\n1. **Start** → `sudo torforge tor` (needs root for iptables)\n2. **Setup** → iptables rules applied as root\n3. **Tor** → Spawns as `debian-tor` user (if available)\n4. **Drop** → TorForge drops privileges to your user\n5. **Cleanup** → Prompts for sudo to remove iptables\n\n#### Recommended Setup\n\nFor maximum security, install the `tor` package to create the `debian-tor` user:\n\n```bash\n# Debian/Ubuntu/Kali\nsudo apt install tor\n\n# This creates the debian-tor user automatically\n```\n\nWhen `debian-tor` exists, Tor will run unprivileged. Without it, Tor runs as root with a warning.\n\n#### Security Flags\n\n| Flag | Description |\n|------|-------------|\n| `--no-ai` | Disable ML exit selection (paranoid mode) |\n| `--keep-root` | Don't drop privileges (not recommended) |\n\n```bash\n# Maximum security mode\nsudo torforge tor --no-ai\n\n# Verify privilege drop\nps aux | grep torforge\n# Should show: jerry (your user), not root\n```\n\n## 🏗️ Architecture\n\n### Package Structure\n\n```\ntorforge/\n├── cmd/torforge/          # CLI application (894 lines)\n├── internal/\n│   ├── ai/                # Circuit selector \u0026 split-tunnel (2 files)\n│   ├── api/               # REST API server\n│   ├── bridge/            # Bridge auto-discovery\n│   ├── bypass/            # Smart bypass rules (6 files)\n│   ├── netfilter/         # iptables management (6 files)\n│   ├── netns/             # Network namespaces\n│   ├── proxy/             # Main proxy controller\n│   ├── security/          # Quantum, decoy, stego, panic (5 files)\n│   ├── tor/               # Tor process management (3 files)\n│   └── ui/                # TUI dashboard\n└── pkg/\n    ├── config/            # Configuration handling\n    └── logger/            # Structured logging\n```\n\n### Network Flow\n\n```\n┌─────────────────────────────────────────────────────────────┐\n│ Application Traffic                                          │\n└──────────────────────┬──────────────────────────────────────┘\n                       ▼\n┌─────────────────────────────────────────────────────────────┐\n│ iptables NAT (PREROUTING/OUTPUT)                            │\n│ → Redirect TCP to Tor TransPort (9040)                      │\n│ → Redirect DNS to Tor DNS Port (5353)                       │\n└──────────────────────┬──────────────────────────────────────┘\n                       ▼\n┌─────────────────────────────────────────────────────────────┐\n│ iptables FILTER                                              │\n│ → Allow Tor process                                          │\n│ → Allow localhost                                            │\n│ → Block ICMP                                                 │\n│ → Block non-Tor UDP                                          │\n│ → DEFAULT DROP (kill switch)                                 │\n└──────────────────────┬──────────────────────────────────────┘\n                       ▼\n┌─────────────────────────────────────────────────────────────┐\n│ Tor Network                                                  │\n│ Guard → Middle → Exit → Destination                         │\n└─────────────────────────────────────────────────────────────┘\n```\n\n---\n\n## ⚙️ Configuration\n\nCreate `/etc/torforge/torforge.yaml`:\n\n```yaml\nproxy:\n  transparent: true\n  block_udp: true\n  block_icmp: true\n\ntor:\n  socks_port: 9050\n  trans_port: 9040\n  dns_port: 5353\n  control_port: 9051\n  data_dir: /var/lib/torforge\n  num_circuits: 8\n\nsecurity:\n  kill_switch: true\n  route_ipv6: true  # Routes through Tor instead of blocking\n\nai:\n  enabled: true\n  data_dir: /var/lib/torforge/ai\n\napi:\n  enabled: false\n  address: 127.0.0.1:8080\n```\n\n---\n\n## 📁 File Locations\n\n| Path | Purpose |\n|------|---------|\n| `/etc/torforge/torforge.yaml` | Configuration |\n| `/var/lib/torforge/` | Runtime data |\n| `/var/lib/torforge/ai/` | AI learning data |\n| `/var/log/torforge/` | Logs |\n\n---\n\n## 🧪 Development\n\n```bash\n# Build\nmake build\n\n# Run tests\nmake test\n\n# Run linter\ngo vet ./...\n\n# Clean build\nmake clean\n```\n\n---\n\n## 📜 License\n\nMIT License - See [LICENSE](LICENSE)\n\n---\n\n## ⚠️ Limitations\n\n| Limitation | Details |\n|------------|---------|\n| **Tor latency** | Adds 100-500ms due to 3-hop routing (inherent to Tor) |\n| **UDP not supported** | Blocked for leak protection - VoIP/gaming won't work |\n| **Some sites block Tor** | Captchas or access denied on some services |\n| **Exit node visibility** | Unencrypted traffic visible at exit (always use HTTPS) |\n\n### What TorForge Protects Against\n\n| Threat | Status |\n|--------|--------|\n| DNS leaks | ✅ Forced through Tor |\n| IPv6 leaks | ✅ Routed through Tor (kill switch active) |\n| UDP leaks | ✅ Blocked |\n| App bypass | ✅ Kernel-level capture |\n| Kill switch bypass | ✅ Default DROP |\n\n### VPN + TorForge\n\n| Order | Works? | What Happens |\n|-------|--------|--------------|\n| **VPN first, then TorForge** | ✅ Yes | ISP sees VPN → VPN sees Tor |\n| **TorForge first, then VPN** | ❌ No | TorForge captures VPN traffic |\n\nTo use with VPN: Connect to VPN first, then start TorForge.\n\n---\n\n## ⚠️ Legal Disclaimer\n\nTorForge is designed for legitimate privacy and security purposes including:\n- Protecting personal privacy\n- Security research\n- Bypassing censorship in restrictive regions\n- Anonymous whistleblowing\n\nUsers are responsible for complying with applicable laws. The developers assume no liability for misuse.\n\n---\n\n\u003cdiv align=\"center\"\u003e\n\n**Built with 🔐 for privacy**\n\n[Report Bug](https://github.com/jery0843/torforge/issues) · [Request Feature](https://github.com/jery0843/torforge/issues)\n\n\u003c/div\u003e\n","funding_links":["https://ko-fi.com/andres__","https://buymeacoffee.com/0xJerry"],"categories":["Network"],"sub_categories":["VPN"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjery0843%2Ftorforge","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjery0843%2Ftorforge","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjery0843%2Ftorforge/lists"}