shadow / tornettoolsLinks
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆41Updated 3 weeks ago
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆97Updated last year
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆39Updated 2 years ago
- ☆21Updated 2 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Benchmarks for the k-FP WF attack☆32Updated 9 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated last year
- A negative testing framework, DoLTEst, for finding non-standard-compliant bugs in LTE protocol implementations of UEs☆40Updated 3 years ago
- A list of attacks or malware using steganography or information hiding☆69Updated last month
- Zero Trust Network Framework☆10Updated 6 years ago
- censors pose a threat to the entire Internet☆141Updated 4 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆106Updated 4 months ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- Post-quantum Wireguard (Theory)☆11Updated 5 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- ☆27Updated 3 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆135Updated 2 weeks ago
- ICS Cybersecurity PCAP respository☆62Updated 7 years ago
- Playing around with IDS data in Keras☆13Updated 5 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆192Updated 3 weeks ago
- Tor, I2P, ZeroNet, Freenet traffic data☆32Updated 4 years ago
- NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot☆63Updated 5 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Geolocate your files!☆16Updated 4 years ago
- ☆108Updated last year
- Run an isolated instance of a tor network in Docker containers☆165Updated 7 years ago
- MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery☆56Updated this week
- ☆32Updated 3 weeks ago
- A tool for modifying and replaying 5G protocol network traffic using attack injection and fuzzing.☆94Updated 2 months ago