shadow / tornettoolsLinks
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆38Updated 4 months ago
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆37Updated last year
- Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.☆9Updated 2 years ago
- ☆25Updated 2 years ago
- ☆22Updated last year
- Tor, I2P, ZeroNet, Freenet traffic data☆32Updated 3 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated 11 months ago
- Geolocate your files!☆16Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Run HTTP and HTTPS traceroutes to detect the network location of censoring middleboxes☆16Updated 2 years ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆96Updated 9 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- ☆24Updated 4 years ago
- Attacks against QUIC (CVE-2022-30591)☆23Updated 2 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated last year
- trustor (PoC)☆25Updated 3 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated last year
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆46Updated 2 years ago
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆23Updated 4 years ago
- ModbusTCP Fuzzing and DoS Tool.☆10Updated 4 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 6 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆120Updated 4 months ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- Zero Trust Network Framework☆10Updated 5 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆48Updated 3 years ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆121Updated last week