shadow / oniontraceLinks
Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.
☆9Updated 2 years ago
Alternatives and similar repositories for oniontrace
Users that are interested in oniontrace are comparing it to the libraries listed below
Sorting:
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --☆10Updated 4 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- ☆12Updated 7 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- building blocks for tor project websites☆12Updated last month
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- lojax_uefi_rootkit_checker☆18Updated 6 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- A library which makes modification of browsers' behavior easy.☆10Updated 4 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆37Updated 12 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆18Updated 2 years ago
- ☆20Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Build scripts for tor binary☆22Updated 3 months ago
- DarkRat source - beware untested source and resources.☆21Updated 5 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆19Updated 3 years ago
- Proof-of-concept web app built on top of Frida☆30Updated 10 years ago
- ☆24Updated 3 years ago
- trustor (PoC)☆25Updated 3 years ago