shadow / tornettoolsLinks
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆40Updated 2 months ago
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆96Updated last year
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆39Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆132Updated last week
- censors pose a threat to the entire Internet☆140Updated 4 years ago
- Blogs about Cryptography/Security to follow☆46Updated 4 years ago
- Geolocate your files!☆16Updated 3 years ago
- The open ransomware payment tracker☆101Updated 3 months ago
- Run an isolated instance of a tor network in Docker containers☆164Updated 6 years ago
- Post-quantum Wireguard (Theory)☆11Updated 5 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- The Tor Path Simulator☆87Updated 8 years ago
- Zero Trust Network Framework☆10Updated 6 years ago
- Benchmarks for the k-FP WF attack☆32Updated 9 years ago
- DoHoT: making practical use of DNS over HTTPS over Tor☆270Updated 4 years ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆117Updated last month
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated last year
- A Shadow plug-in that runs the Tor anonymity software☆50Updated 4 years ago
- Fork: THC-SSL-DOS is a tool to verify the performance of SSL.☆60Updated 3 years ago
- ☆21Updated last year
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆43Updated 5 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆187Updated 7 months ago
- quotes i like.☆16Updated 6 years ago
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ -- discuss proposals on tor-dev@lists.torprojec…☆249Updated last year
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Updated 2 months ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 5 years ago
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆209Updated last year
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆77Updated 2 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆80Updated 6 years ago
- goscanner is a tool for large-scale TLS and SSH scans☆31Updated this week
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago