kans / BitBlinder
This is most of the source to the BitBlinder project. The goal was to allow people to communicate or share information in any form online anonymously with ease and quickly. To meet this end, it employed a novel micropayment system on top of a slightly modified Tor network. It is posted in the hope that someone may receive benefit from the wor…
☆14Updated 13 years ago
Related projects ⓘ
Alternatives and complementary repositories for BitBlinder
- learning related projects☆18Updated 9 years ago
- AdoptOpenJDK main binary releases for OpenJDK 9 with Eclipse OpenJ9☆9Updated 6 years ago
- ☆20Updated 5 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 3 weeks ago
- Tor relay certificate downloader☆11Updated 7 years ago
- Java Dissassembler☆16Updated 5 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Trusted and Tested Core Dump Library☆8Updated last year
- ☆44Updated last year
- Mirror of git://git.code.sf.net/p/libdwarf/code☆15Updated 8 years ago
- ☆37Updated 9 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Updated 7 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 5 years ago
- Test Suite for John the Ripper☆24Updated 2 years ago
- Repository for Tor's DNS-related issues.☆17Updated 7 years ago
- Simple web frontend to an elasticsearch database made for local files indexing☆19Updated 5 years ago
- BitTorrent Tracker☆32Updated 15 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆25Updated 10 years ago
- Random notes I want to backup.☆18Updated 2 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 7 years ago
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- Declarative syntax for defining sets of URLs. No need for error-prone regexs.☆20Updated 5 years ago
- A program to crawl the bittorrent dht, resulting in a list of magnet links and their resolved metadata☆17Updated 8 years ago
- Man in the Middle SOCKS Proxy for JAVA☆35Updated 11 years ago