shadow / tornettoolsLinks
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆39Updated 7 months ago
Alternatives and similar repositories for tornettools
Users that are interested in tornettools are comparing it to the libraries listed below
Sorting:
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆94Updated last year
- ☆21Updated last year
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆38Updated last year
- Benchmarks for the k-FP WF attack☆31Updated 9 years ago
- ☆26Updated last year
- censors pose a threat to the entire Internet☆137Updated 3 years ago
- List of crackpot 'scientists' and 'thinkers'☆20Updated 2 months ago
- ☆25Updated 4 years ago
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 3 years ago
- ☆102Updated 7 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆124Updated last week
- goscanner is a tool for large-scale TLS and SSH scans☆31Updated last year
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆203Updated last year
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆70Updated 2 years ago
- Geolocate your files!☆16Updated 3 years ago
- ☆22Updated 5 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆44Updated last year
- Post-quantum Wireguard (Theory)☆11Updated 4 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆88Updated 2 years ago
- Attacks against QUIC (CVE-2022-30591)☆25Updated 2 years ago
- A Python framework for creating emulation of the Internet.☆255Updated last week
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 8 years ago
- ☆25Updated 3 years ago
- Go Trusted Execution Environment (TEE)☆134Updated 3 weeks ago
- ☆23Updated 3 years ago
- DDoS simulation written in Python using "scapy" and "multiprocessing" libraries. Used for educational purposes☆17Updated 4 years ago