shadow / tornettoolsLinks
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆41Updated 3 weeks ago
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆97Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆136Updated last week
- Post-quantum Wireguard (Theory)☆12Updated 5 years ago
- Thirteen Years of Tor Attacks☆331Updated 3 years ago
- Geolocate your files!☆16Updated 4 years ago
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆41Updated 2 years ago
- ☆22Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆210Updated last year
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- censors pose a threat to the entire Internet☆141Updated 4 years ago
- High Interaction Honeypot Solution for Redis protocol☆25Updated 4 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆228Updated 3 years ago
- MalwareDB: bookkeeping for malware, goodware, and unknown files with relationship discovery☆56Updated this week
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- Script fingerprinting systems based on shodan.io data☆12Updated 7 years ago
- ☆25Updated 4 years ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆101Updated 3 years ago
- Blogs about Cryptography/Security to follow☆46Updated 4 years ago
- A list of attacks or malware using steganography or information hiding☆70Updated last month
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- ☆26Updated last year
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- Run an isolated instance of a tor network in Docker containers☆165Updated 7 years ago
- Botnet Simulation Framework☆78Updated 5 years ago
- Zero Trust Network Framework☆10Updated 6 years ago
- Benchmarks for the k-FP WF attack☆32Updated 9 years ago
- ☆85Updated 2 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- packet captures of real-world ddos attacks☆166Updated 3 months ago