DonnchaC / tor-hsdir-research
Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done to help fix these problems in Tor. Help out! https://blog.torproject.org/blog/hidden-services-need-some-love
☆11Updated 9 years ago
Alternatives and similar repositories for tor-hsdir-research:
Users that are interested in tor-hsdir-research are comparing it to the libraries listed below
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- free crypto audit☆31Updated 7 years ago
- ☆17Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Command-line utility to control Tor.☆89Updated last year
- A Python / Scapy implementation of the OR (TOR) protocol.☆97Updated 3 years ago
- python tor client☆27Updated 9 years ago
- ☆32Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆61Updated 12 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆44Updated 5 years ago
- ☆24Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- ☆12Updated 8 years ago
- the cyber crypto cryptocoin☆35Updated 7 years ago
- A tool (and library) for TACKs☆26Updated 7 years ago
- Planning for next generation secure chat.☆37Updated 10 years ago
- ☆30Updated 9 years ago
- Parsing library for Tor-specific data formats.☆43Updated last year
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- The Tor Path Simulator☆86Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- A user-first approach to threat modeling.☆16Updated 5 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆142Updated 9 years ago