shadow / oniontraceLinks
Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.
☆9Updated 2 years ago
Alternatives and similar repositories for oniontrace
Users that are interested in oniontrace are comparing it to the libraries listed below
Sorting:
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --☆10Updated 4 years ago
- trustor (PoC)☆25Updated 3 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆18Updated 2 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- quotes i like.☆15Updated 5 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 12 years ago
- building blocks for tor project websites☆13Updated 3 weeks ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆39Updated 5 months ago
- The pattern matching swiss knife☆15Updated 5 years ago
- ☆24Updated 4 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 5 years ago
- Fish shell plugin to extract (almost) any kind of archives☆11Updated 9 years ago
- Uses NASM Shell Tool from Metasploit to friendly export Python / C / CPP shellcode from assembly instructions.☆16Updated 4 years ago
- Warning! Don't run this code on your computer.☆15Updated 6 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- Build scripts for tor binary☆22Updated 5 months ago
- A library which makes modification of browsers' behavior easy.☆10Updated 4 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- CA Issuers Monitor (Authority Info Access)☆14Updated 2 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Multi-head SSH honeypot system.☆21Updated last year
- fuzz code from openssl updated to target libressl☆18Updated last year