shadow / tornettools
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆36Updated last month
Alternatives and similar repositories for tornettools:
Users that are interested in tornettools are comparing it to the libraries listed below
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆36Updated last year
- Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.☆10Updated last year
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆93Updated 6 months ago
- Tor, I2P, ZeroNet, Freenet traffic data☆28Updated 3 years ago
- A crawler based on Tor Browser and Selenium☆54Updated 3 years ago
- Run an isolated instance of a tor network in Docker containers☆162Updated 6 years ago
- The Tor Path Simulator☆86Updated 8 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- A Shadow plug-in that runs the Tor anonymity software☆49Updated 3 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Updated 8 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆49Updated 8 months ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- ☆24Updated 2 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- quotes i like.☆14Updated 5 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- BAT KEM/Signature Reference Implementation☆20Updated 3 years ago
- C++ Library for Mobile Private Contact Discovery☆27Updated 3 years ago
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆22Updated 4 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆48Updated 3 years ago
- Experimental implementation of KEMTLS in Rustls☆29Updated last year
- Blogs about Cryptography/Security to follow☆47Updated 3 years ago
- ☆22Updated 2 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆19Updated 4 years ago
- Tools for power measurements of post-quantum cryptographic algorithms☆26Updated 5 years ago