shadow / oniontrace
Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.
☆10Updated last year
Alternatives and similar repositories for oniontrace:
Users that are interested in oniontrace are comparing it to the libraries listed below
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --☆10Updated 4 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 11 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- tamper resistant audit log☆18Updated 6 years ago
- building blocks for tor project websites☆11Updated 4 months ago
- ld_preload userland rootkit☆34Updated 4 years ago
- A tool / library for simplifying string obfuscation with xor.☆23Updated 7 months ago
- Fish shell plugin to extract (almost) any kind of archives☆10Updated 8 years ago
- Importable Firefox profile for use with i2p. Also usable with Tor Browser on most platforms.☆14Updated 5 years ago
- Warning! Don't run this code on your computer.☆15Updated 5 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆18Updated last year
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Multi-head SSH honeypot system.☆21Updated 11 months ago
- A high scalable low to medium interactive SSH/TCP honeypot using Linux Namespaces, capabilities, seccomp, cgroups designed for OpenWrt an…☆30Updated 4 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16Updated 3 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- An HTTP proxy that enables access to Tor Onion Services☆15Updated 3 years ago
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated last month
- Binary and Static Releases☆13Updated this week
- CA Issuers Monitor (Authority Info Access)☆13Updated last year
- RetDec Decompiler Plugin for Rizin☆28Updated 8 months ago
- A small tool for brute forcing the access code of a Yubico Yubikey.☆20Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- A forensic system baselining, searching, and evidence collection tool☆16Updated 5 years ago