owenson / tor-research-frameworkLinks
Tor research framework in Java
☆56Updated 9 years ago
Alternatives and similar repositories for tor-research-framework
Users that are interested in tor-research-framework are comparing it to the libraries listed below
Sorting:
- ☆222Updated 7 years ago
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Updated 5 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- An API for consuming all the memory of Java apps using deserialization☆28Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- PoC app for raw pdu manipulation on Android.☆121Updated 9 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago
- Passive SSL client fingerprinting using handshake analysis.☆112Updated 7 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 3 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆708Updated 8 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆304Updated 3 years ago
- ☆198Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated 6 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 9 years ago
- OWASP Passfault evaluates passwords and enforces password policy in a completely different way.☆175Updated 4 years ago
- Detect snooper on your system!☆83Updated 8 years ago