DonnchaC / tor-hsdir-researchLinks
Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done to help fix these problems in Tor. Help out! https://blog.torproject.org/blog/hidden-services-need-some-love
☆11Updated 9 years ago
Alternatives and similar repositories for tor-hsdir-research
Users that are interested in tor-hsdir-research are comparing it to the libraries listed below
Sorting:
- free crypto audit☆31Updated 8 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 3 years ago
- Replicating Encrypted PasteBin☆75Updated 8 years ago
- Command-line utility to control Tor.☆89Updated last year
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- A OS X crypto ransomware PoC☆88Updated 9 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆61Updated 8 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 3 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- ☆12Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆43Updated 9 years ago
- Password manager for USB Armory☆36Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 5 years ago
- ☆55Updated 9 years ago
- Distributed, tamper-resistant circumvention tools☆50Updated 9 years ago