NullHypothesis / sybilhunter
Hunting for Sybils and anomalies in archived Tor network data.
☆44Updated 5 years ago
Alternatives and similar repositories for sybilhunter:
Users that are interested in sybilhunter are comparing it to the libraries listed below
- Parsing library for Tor-specific data formats.☆43Updated last year
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 8 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- The Tor Path Simulator☆86Updated 8 years ago
- bulb is not stem☆29Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆97Updated 3 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- python tor client☆26Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Command-line utility to control Tor.☆89Updated last year
- ☆32Updated 10 years ago
- free crypto audit☆31Updated 7 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- ☆10Updated 6 years ago
- orc - Onion router control protocol library.☆39Updated 7 years ago
- oht is an onion routed (using the Tor network, similar in design to ricochet and onionshare) distributed hash table to be used as the bas…☆45Updated 6 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 12 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 10 years ago
- Delicious Onion Service Wraps.☆23Updated 9 years ago
- ipcipher is a specification for encrypting IP{v4,v6} addresses 'in place'.☆19Updated 6 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago