DonnchaC / tor-hsdir-researchLinks
Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done to help fix these problems in Tor. Help out! https://blog.torproject.org/blog/hidden-services-need-some-love
☆11Updated 10 years ago
Alternatives and similar repositories for tor-hsdir-research
Users that are interested in tor-hsdir-research are comparing it to the libraries listed below
Sorting:
- The Tor Path Simulator☆87Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- free crypto audit☆31Updated 8 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Threatbutt Suite☆37Updated 10 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- ☆31Updated 5 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- A OS X crypto ransomware PoC☆88Updated 10 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- misc stuff☆19Updated 8 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- the programmable network proxy☆112Updated 2 years ago
- ☆12Updated 8 years ago
- This is where we work on the newsletter☆28Updated 8 years ago
- ☆25Updated 8 years ago