DonnchaC / tor-hsdir-researchLinks
Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done to help fix these problems in Tor. Help out! https://blog.torproject.org/blog/hidden-services-need-some-love
☆11Updated 10 years ago
Alternatives and similar repositories for tor-hsdir-research
Users that are interested in tor-hsdir-research are comparing it to the libraries listed below
Sorting:
- The Tor Path Simulator☆87Updated 9 years ago
- free crypto audit☆31Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- This is where we work on the newsletter☆28Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Command-line utility to control Tor.☆90Updated 2 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 4 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 9 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Parsing library for Tor-specific data formats.☆42Updated 2 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- A OS X crypto ransomware PoC☆89Updated 10 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- ☆10Updated 7 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- ☆17Updated 11 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago