owenson / tor-research-frameworkLinks
Tor research framework in Java
☆56Updated 9 years ago
Alternatives and similar repositories for tor-research-framework
Users that are interested in tor-research-framework are comparing it to the libraries listed below
Sorting:
- ☆222Updated 7 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 3 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- deprecated fork of Java Tor Control Library☆28Updated 4 years ago
- This library was co-developed with a leading financial institution in order to build a single solution for Cross-Site Request Forgery (CS…☆20Updated 8 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- iSEC Partners' research publications☆76Updated 8 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Provides a JAR and an AAR for embedding the Tor Onion Proxy into a Java or Android Program☆182Updated last year
- ☆198Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- http://krakenapps.org Kraken is an opensource information security suite for java developers.☆63Updated 10 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- PoC app for raw pdu manipulation on Android.☆121Updated 9 years ago
- Passive SSL client fingerprinting using handshake analysis.☆111Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- Encrypted Text Messaging☆147Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Java tracing agent and live trace client☆73Updated 2 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆98Updated 8 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago