owenson / tor-research-frameworkLinks
Tor research framework in Java
☆56Updated 9 years ago
Alternatives and similar repositories for tor-research-framework
Users that are interested in tor-research-framework are comparing it to the libraries listed below
Sorting:
- ☆222Updated 7 years ago
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Updated 8 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Updated last year
- Ahmia hidden service search engine☆206Updated 2 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆708Updated 8 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 10 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- PoC app for raw pdu manipulation on Android.☆121Updated 10 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆201Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- ☆12Updated 9 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Packetpig - Open Source Big Data Security Analytics☆298Updated 7 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 9 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 10 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Tools for downloading zone data and authentication credentials from ICANN's CZDS application.☆125Updated 6 years ago
- Honeynet Project generic authenticated datafeed protocol☆216Updated last year
- http://krakenapps.org Kraken is an opensource information security suite for java developers.☆63Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago