DonnchaC / tor-hsdir-researchLinks
Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done to help fix these problems in Tor. Help out! https://blog.torproject.org/blog/hidden-services-need-some-love
☆11Updated 9 years ago
Alternatives and similar repositories for tor-hsdir-research
Users that are interested in tor-hsdir-research are comparing it to the libraries listed below
Sorting:
- The Tor Path Simulator☆87Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Command-line utility to control Tor.☆89Updated last year
- This is where we work on the newsletter☆28Updated 7 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆63Updated 9 years ago
- Parsing library for Tor-specific data formats.☆43Updated last year
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Threatbutt Suite☆37Updated 10 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- ☆56Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- ☆10Updated 6 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 5 years ago