shadow / tornettools
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆30Updated last year
Related projects: ⓘ
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆35Updated 8 months ago
- A Shadow plug-in that runs the Tor anonymity software☆49Updated 3 years ago
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --☆54Updated 2 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆88Updated last month
- unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ -- discuss proposals on tor-dev@lists.torprojec…☆222Updated 5 months ago
- A python library that implements a number of Privacy Enhancing Technolgies☆130Updated last year
- ☆22Updated 2 years ago
- Run an isolated instance of a tor network in Docker containers☆157Updated 5 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Proteus: Programmable Protocols for Censorship Circumvention☆26Updated last year
- A utility to track the performance of Tor and Tor onion services☆19Updated 5 years ago
- The Tor Path Simulator☆86Updated 7 years ago
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆21Updated 3 years ago
- This is a repository to track issues and suggestions to the Pluggable Transports spec☆25Updated 2 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 7 years ago
- Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf☆15Updated 5 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆43Updated 5 years ago
- ☆6Updated 6 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆10Updated 6 months ago
- Quic Pluggable Transport for Tor.☆13Updated 5 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆40Updated 8 months ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆45Updated 3 months ago
- trustor (PoC)☆24Updated 2 years ago
- Tor, I2P, ZeroNet, Freenet traffic data☆22Updated 2 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 3 years ago
- Thirteen Years of Tor Attacks☆266Updated last year
- A library for peer discovery inside the Tor network☆26Updated 5 months ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 6 years ago
- Cryptography code examples using libsodium and mbedtls C libraries and Python cryptography and PyNaCl modules☆70Updated 4 years ago