shadow / tornettoolsLinks
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆41Updated 3 weeks ago
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆97Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆41Updated 2 years ago
- A list of attacks or malware using steganography or information hiding☆70Updated last month
- ☆22Updated 2 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Geolocate your files!☆16Updated 4 years ago
- High Interaction Honeypot Solution for Redis protocol☆25Updated 4 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Updated 6 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆137Updated this week
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ -- discuss proposals on tor-dev@lists.torprojec…☆254Updated last year
- The open ransomware payment tracker☆101Updated 5 months ago
- Tor, I2P, ZeroNet, Freenet traffic data☆32Updated 4 years ago
- Benchmarks for the k-FP WF attack☆32Updated 9 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- censors pose a threat to the entire Internet☆141Updated 4 years ago
- A free online class on network information hiding/steganography/covert channels.☆108Updated last month
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- ☆28Updated 3 years ago
- Trufflehunter is a tool that uses DNS cache snooping on public DNS resolvers to measure the prevalence of rare applications and domains o…☆23Updated 4 years ago
- ☆25Updated 4 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Updated 2 years ago
- ☆22Updated 5 years ago
- Few tools for a Tor relay.☆65Updated this week
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆23Updated 3 years ago
- ☆26Updated last year
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆163Updated 5 months ago
- A logic-based enterprise network security analyzer☆137Updated 3 years ago
- Zero Trust Network Framework☆10Updated 6 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago