shadow / tornettoolsLinks
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆39Updated last month
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆96Updated last year
- Benchmarks for the k-FP WF attack☆31Updated 9 years ago
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆38Updated last year
- ☆21Updated last year
- A Python framework for creating emulation of the Internet.☆259Updated last week
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆129Updated this week
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆24Updated 5 years ago
- Zero Trust Network Framework☆10Updated 6 years ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆74Updated 2 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆14Updated last year
- ☆26Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- The Scyther Tool for the symbolic analysis of security protocols☆106Updated last month
- A Shadow plug-in that runs the Tor anonymity software☆50Updated 4 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Attacks against QUIC (CVE-2022-30591)☆25Updated 2 years ago
- Tor, I2P, ZeroNet, Freenet traffic data☆31Updated 4 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆183Updated 6 months ago
- Geolocate your files!☆16Updated 3 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- ☆101Updated 9 months ago
- ☆30Updated last month
- ☆25Updated 4 years ago
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆23Updated 3 years ago
- censors pose a threat to the entire Internet☆139Updated 4 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Run an isolated instance of a tor network in Docker containers☆164Updated 6 years ago