shadow / tornettoolsLinks
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆39Updated 5 months ago
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆39Updated last year
- Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.☆9Updated 2 years ago
- trustor (PoC)☆25Updated 3 years ago
- Geolocate your files!☆16Updated 3 years ago
- quotes i like.☆15Updated 5 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated last month
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 3 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- List of crackpot 'scientists' and 'thinkers'☆19Updated 3 weeks ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆125Updated last week
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- PANORAMIX repo☆20Updated 2 years ago
- ☆24Updated 4 years ago
- Common python and scapy scripts for Wi-Fi☆64Updated 3 months ago
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆35Updated 3 years ago
- censors pose a threat to the entire Internet☆135Updated 3 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆54Updated 5 months ago
- ☆21Updated last year
- BAT KEM/Signature Reference Implementation☆22Updated 3 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆24Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆37Updated 2 years ago
- A network packet synthesis language☆20Updated 2 months ago