shadow / oniontrace
Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.
☆9Updated 2 years ago
Alternatives and similar repositories for oniontrace
Users that are interested in oniontrace are comparing it to the libraries listed below
Sorting:
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --☆10Updated 4 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆38Updated 3 months ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- fuzz code from openssl updated to target libressl☆18Updated last year
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 4 years ago
- Configure SPI flash write protection.☆23Updated 5 years ago
- building blocks for tor project websites☆12Updated 3 weeks ago
- A tool to extract code from individual functions in a library.☆16Updated 5 months ago
- Containing vulnerabilities I've discovered and maybe CVE☆18Updated 2 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Secure/anonymous IRC-like chat using TOR hidden services☆40Updated 11 years ago
- module for certexfil☆15Updated 2 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- trustor (PoC)☆25Updated 3 years ago
- Source code of https://torstatus.rueckgr.at☆10Updated 3 months ago
- Warning! Don't run this code on your computer.☆15Updated 6 years ago
- Fish shell plugin to extract (almost) any kind of archives☆10Updated 9 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆11Updated 2 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆16Updated 7 years ago