A collection of C++ HTTP libraries including an easy to use HTTP server.

Proxygen: Facebook's C++ HTTP Libraries This project comprises the core C++ HTTP abstractions used at Facebook. Internally, it is used as the basis for building many HTTP servers, proxies, and clients. This release focuses on t

Related Repos

pavel-odintsov Community Edition FastNetMon - A high performance DoS/DDoS load analyzer built on top of multiple packet capture engines (NetFlow, IPFIX, sFlow, AF_PACKET, SnabbSwitch, netmap, PF_RING (obsoleted), PCAP). What do we

varnish hitch TLS proxy hitch is a network proxy that terminates TLS/SSL connections and forwards the unencrypted traffic to some backend. It's designed to handle 10s of thousands of connections efficiently on multicore machines. See

envoyproxy Cloud-native high-performance edge/middle/service proxy Envoy is hosted by the Cloud Native Computing Foundation (CNCF). If you are a company that wants to help shape the evolution of technologies that are container-packaged, dynamically

wifidog WifiDog The WiFi Guard Dog project is a complete and embeddable captive portal solution for wireless community groups or individuals who wish to open a free hotspot while still preventing abuse of their Internet connection. M

hamidreza-s NanoChat NanoChat is a peer-to-peer, end-to-end encrypted and discoverable chat application that can be used inside command line. It is totally server-less and every peer can discover other peers in the same subnet without having

smyte ratelimit A high-performance rate limiter written in C++ that speaks Redis protocol. See our blog post to learn more. Building from source Ensure Bazel is installed Check out the smyte-db repo Ensure your submo

tass-belgium picoTCP Welcome to the one and only picoTCP repository. picoTCP is a small-footprint, modular TCP/IP stack designed for embedded systems and the Internet of Things. It's actively being developed by Altran Intelligent Systems.

robertdavidgraham telnetlogger This is a simple program to log login attempts on Telnet (port 23). It's designed to track the Mirai botnet. Right now (Oct 23, 2016) infected Mirai machines from around the world are trying to connect to Telnet on