tortunnel is a partial Onion Proxy implementation that's designed to build single-hop circuits through TOR exit nodes. This is useful for instances where you might want some very low level of anonymity and don't want to deal with the performance implications of using TOR's full three-hop circuits. It runs both as a SOCKS interface, and also exposes a fairly clean asynchronous C++ API to the TOR protocol itself. It was first written as a scanning tool for checking to see whether exit nodes were running sslstrip and is well suited for implementing other high-performance scanning routines against the TOR network as a whole. It might also be useful for implementing a perspectives-like interface for checking SSL, SSH, or other host certificates. It could be useful as an nmap scanning mode, or perhaps for something else entirely. To use the SOCKS interface, extract and compile the source. You will need the BOOST libraries in
Features
* On Demand
o Can load keys when ssh is launched.
o Can load keys when the Apple Keychain is unlocked.
* Security
o Can unload keys on sleep (or after a period of sleep).
o Can unload keys when the screenssaver kicks in.
o Can unload keys when the Apple Keychain is locked.
o Can lock the Apple Keychain when the screensaver kicks in.
o Can ask for confirmation when keys are accessed (useful for agent forwarding).
* Display
o Icon can be displayed in the statusbar, dock, or both.
* Integration
o Apple Keychain
+ Can store SSH key passphrases in the Apple Keychain.
+ Can lock/unlock the Apple Keychain from a menu item.
o Global Environment
+ Can add the necessary variables to the global environment, so you can use SSHKeychain with Project Builder, etc.
o SSH Tools
+ Works seamless with the commandline tools (adding keys from the commandline also updates the UI).
+ Can generate new keypairs from the UI.
* Networking
o Tunneling
+ Local ports can be forwarded over a ssh connection from the tunnel menu.
+ Tunnels can be launched when your keys are loaded.
+ The tunnel menu indicates the status of your tunnels.
+ Tunnels are automatically closed when the system goes to sleep.
+ Multiple ports can be forwarded over one ssh connection.
o Can handle agent requests through Agent Forwarding.
httptunnel creates a bidirectional virtual data connection tunnelled in HTTP requests. The HTTP requests can be sent via an HTTP proxy if so desired.
This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall.
There are times when you want to connect to the Internet through unknown and/or insecure networks such as the local Panera or other WiFi hotspot. If you aren’t careful, you might make it all too easy for someone to sniff your connection using Ettercap
If you cannot use a SSH client to bypass the firewall (403 error, connect command not allowed) you can use GNU httptunnel to bypass the firewall. As an example we forward again the Windows Remote Desktop (port 3389).