shadow / tornettools
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆38Updated 3 months ago
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆37Updated last year
- Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.☆9Updated 2 years ago
- ☆22Updated last year
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆22Updated 4 years ago
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --☆61Updated 3 years ago
- A Shadow plug-in that runs the Tor anonymity software☆49Updated 3 years ago
- trustor (PoC)☆25Updated 3 years ago
- The Tor Path Simulator☆86Updated 8 years ago
- censors pose a threat to the entire Internet☆133Updated 3 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆120Updated last week
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Tor, I2P, ZeroNet, Freenet traffic data☆31Updated 3 years ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆96Updated 9 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Geolocate your files!☆16Updated 3 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆48Updated 3 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆13Updated 7 years ago
- Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf☆15Updated 5 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- ☆25Updated 2 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated last year
- A man in the middle detection tool for LANs☆26Updated last year
- FTP Honeypot☆31Updated last year
- Multi-head SSH honeypot system.☆21Updated last year
- A guide to downloading all public DDoSecrets releases via torrent☆52Updated last year
- Network Tools☆32Updated last year
- ☆24Updated 4 years ago