steinex / tor-ddos
Attempt to help against the ongoing Tor DDoS attacks
☆11Updated 2 years ago
Alternatives and similar repositories for tor-ddos:
Users that are interested in tor-ddos are comparing it to the libraries listed below
- Tor DDoS Protection - iptables rules for Tor relay operators to mitigate DDoS☆59Updated last month
- Few tools for a Tor relay.☆50Updated 2 weeks ago
- DDoS protection system PoC for HaProxy☆25Updated 3 years ago
- Shared server infrastructure☆47Updated 2 weeks ago
- Automation to report malicious actors to AbuseIPDB for users of Cloudflare WAF☆22Updated 2 months ago
- Command-line monitor for Tor.☆127Updated 6 months ago
- IPv6 rotator for specific subnets - unblock restrictions on IPv6 enabled websites (Google by default but customizable for others)☆88Updated 2 weeks ago
- A practical approach to Privacy and Security☆113Updated this week
- Automated 🧅 Tor ❄️ Snowflake Proxy (any Linux device). Run install.sh and you have a new Snowflake ProxyService (every boot)☆25Updated 11 months ago
- Safing Privacy Network☆257Updated 9 months ago
- Tirdad kernel module for random ISN generation☆26Updated 3 months ago
- ☆79Updated last year
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆45Updated 2 weeks ago
- Crowdsec bouncer written in golang for firewalls☆121Updated 3 weeks ago
- ❄️ Temporarily Share Your Bandwidth☆114Updated last year
- Anon pastebin☆67Updated last month
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆116Updated this week
- Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)☆64Updated last year
- DoHoT: making practical use of DNS over HTTPS over Tor☆236Updated 3 years ago
- Collection of links on bad opsec☆90Updated 7 months ago
- Vanguards help guard you from getting vanned...☆220Updated 6 months ago
- Traps web spiders☆65Updated 4 years ago
- Simple way to run a Monero daemon with some basic monitoring tools packaged in.☆123Updated last week
- A self hosted yopmail like server running in a docker☆61Updated 10 months ago
- IP.blackhole is an IP blacklist that uses multiple sensors to identify network attacks (e.g. SSH brute force) and spam incidents. All rep…☆37Updated 5 months ago
- I2P+ is a soft-fork of the Java I2P Anonymizing Network Layer☆32Updated this week
- The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhanc…☆109Updated 9 months ago
- A list of resources to help me keep track of important news/studies/projects/etc. in the privacy & security world.☆37Updated last year
- a framework for traffic analysis defenses☆60Updated 2 weeks ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆137Updated last week