owenson / tor-research-framework
Tor research framework in Java
☆55Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for tor-research-framework
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- ☆220Updated 7 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 8 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- deprecated fork of Java Tor Control Library☆28Updated 3 years ago
- Encrypted Text Messaging☆145Updated 8 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆117Updated 7 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆699Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆140Updated 9 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 8 years ago
- Passive SSL client fingerprinting using handshake analysis.☆112Updated 7 years ago
- PoC app for raw pdu manipulation on Android.☆120Updated 9 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Updated 7 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 8 years ago
- Java tracing agent and live trace client☆73Updated last year
- Published security vulnerabilities, research, and associated information.☆136Updated 4 years ago
- ☆138Updated 6 years ago
- Panic button for protection against cold boot attacks☆139Updated 2 years ago
- A Cuckoo Sandbox Extension for Android☆76Updated 9 years ago
- The Tor Path Simulator☆86Updated 7 years ago
- Man in the Middle SOCKS Proxy for JAVA☆35Updated 11 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆57Updated 4 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago