owenson / tor-research-framework
Tor research framework in Java
☆56Updated 9 years ago
Alternatives and similar repositories for tor-research-framework
Users that are interested in tor-research-framework are comparing it to the libraries listed below
Sorting:
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 3 years ago
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Updated 8 years ago
- ☆221Updated 7 years ago
- A Cuckoo Sandbox Extension for Android☆76Updated 10 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- ☆44Updated 7 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- Tool for introspection of SSL\TLS sessions☆140Updated 4 months ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Malware Control Monitor☆87Updated 10 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- ☆137Updated 7 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆102Updated 8 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- ☆25Updated 8 years ago
- The Tor Path Simulator☆86Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 9 years ago
- ☆198Updated 9 years ago
- ☆27Updated 7 years ago