shadow / oniontrace
Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.
☆10Updated last year
Alternatives and similar repositories for oniontrace:
Users that are interested in oniontrace are comparing it to the libraries listed below
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --☆10Updated 4 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 8 years ago
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- A library which makes modification of browsers' behavior easy.☆10Updated 3 years ago
- My software engineering notes.☆17Updated this week
- building blocks for tor project websites☆11Updated 3 months ago
- module for certexfil☆15Updated 2 years ago
- Warning! Don't run this code on your computer.☆15Updated 5 years ago
- lojax_uefi_rootkit_checker☆18Updated 6 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Updated 6 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆18Updated last year
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- 来自Freebuf评论区,一个UEFI马.☆47Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- ☆24Updated 3 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Man-in-the-middle against Tor bridges☆26Updated 4 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆9Updated 5 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆19Updated 2 years ago