Комментарий 17 написал: MarcosScelo 12 декабря Зарегистрирован: 7. Комментарий 16 написал: MarcosScelo 11 декабря Зарегистрирован: 7. Комментарий 15 написал: MarcosScelo 6 декабря Зарегистрирован: 7. Комментарий 14 написал: MarcosScelo 29 ноября Зарегистрирован: 7.
Комментарий 13 написал: MarcosScelo 28 ноября Зарегистрирован: 7. Комментарий 12 написал: MarcosScelo 27 ноября Зарегистрирован: 7. Комментарий 11 написал: MarcosScelo 26 ноября Зарегистрирован: 7. Назад 1 2 Дальше. Сделать стартовой Добавить в избранное. Расширенный поиск по веб-сайту. Запамятовал Регистрация.
Навигация по веб-сайту. У нас принято! Военная кафедра НУЦ Гео. Кафедры ЭнМИ. Календарь публикаций. Друзья веб-сайта. Популярные статьи. Мы в соц. Наш опрос. Архив новостей. РФ » Комменты. Комментарий Статус: Гость Публикаций: 0 Комментариев: РФ Все права защищены. Back in , judicial agencies and law enforcement agencies all around the globe against the Tor network services.
In past, Tor network has announced that some unknown sources have managed to get the information about people who are using these hidden services. Here we are presenting a list of top 5 best Tor alternatives that you can use:. I2P is an anonymous peer-to-peer distributes communication layer which is built using the open source tools. It is a complete Tor alternative. Just like any other P2P software, the software implementing this computer network layer is called I2P layer and other computers running I2P is called I2P node.
It is designed and optimized for hidden services, faster than Tor with fully distributed and self-organizing capability. Unlike Tor, peers are selected based on continuous ranking and profiling. There are unidirectional tunnels instead if bidirectional circuits, thus making the number of nodes double which a node has to compromise to get the same information.
Tails is one of the best Tor alternatives available out there. It has in-built pre-configured apps that give you the services of a web browser, IM client, office suite, editors for image and sound etc. This could be used anywhere without leaving any trace. It uses the Tor network just like Tails but it focuses on usability.
It boasts that it has built-in encrypted email client, built-in disk encryption and firewall. Added to these, Subgraph OS provides you the advantages of limiting the ability of malicious files and data formats. Freenet is a peer-to-peer to resist the censorship similar to I2P. It uses the same P2P technology of distributing data storage to deliver and keep the information but separates the protocol of user interaction and network structure.
This makes it easy to access the Freenet network using a variety of ways like FProxy. Since its version 0. With the help of Opennet, users connect to arbitrarily with other users. Using Darknet, users connect to only those users with whom they exchanged Public Keys in the past. Both of these modes could be used together.
It comes with a free software suite to enhance the censorship free communication over the web.
It provides Tor Hidden Services to customers wanting to host their sites via their own onion address. Ablative Hosting — provides three different types of hosting solutions: ClearNet hosting with Single Hop onion, Multi Hop onion hosting fully hidden service and the QuadHop onion hosting for the truly paranoid. It is possible to buy onion hosting with Monero XMR. CloudFlare — CloudFlare onion mirror. TorWhois — Tor Whoois database. MullVad VPN — virtual private network service.
The Pirate Bay — Download music, movies, games, software and much more. Demonoid — onion torrents. TorrentGalaxy — deepweb torrents. Rutor — one of the most famous Russian torrent tracker. Key Base — secure messaging and file-sharing. Snowfl — one of the biggest torrent aggregators.
Lufi Espiv Files — free speech file histing software. SongStems — music share service. DeepWebArchive — onion web pages archive. Political: ProPublica — independent, nonprofit newsroom that produces investigative journalism with moral force. SoylentNews — open-source and community-oriented news aggregator where users can submit their stories.
Deutsche Welle — News and current affairs from Germany and around the world. Tape — News aggregator. Social Networks: Facebook — is a official mirror that allows access to Facebook through the Tor protocol, using its. Galaxy 3 — underground social network, where you can find computer code experts, people searching for adult dates, and other interesting individuals. Sekret — free speech secure social network, where you can share your secrets.
Torigon — social network. CryptBB — social network. Gray Scale — Japanese blog about deep web exploring and more. Deep web radio. Encyclopedia dramatica. Dark like my soul. Scientology Archive. All the latest news for tor. Michael Blizek. Blog about Stories. Mike Tigas. Sam Whited. An Open Letter to Revolutionaries.
Matt Traudt — expert on privacy and security performing research and development on Tor. Marxists Internet Archive — collection of books and materials about marxism. Cheena — Japanese blogger, web developer and security researcher. Russian deepweb links: Словесный Богатырь — another russian library, where you can find millions of books.
Russian community — market and anonymous talks about security. Hydra Market — Russian dark marketplace, operating since Medusa Market — famous Russian dark marketplace. Hydra Test — all drugs tests from the famous Hydra Marketplace with region filters and more. Mega Darknet Market — Russian dark marketplace, operating since Matanga — Russian dark marketplace, connected with SpiceForum.
Ozon o3Shop — Russian dark marketplace. R2D2 — russian anonymous market. RAMP — biggest russian market. Amberoad — russian anonymous market. Флибуста — independent russian wiki library. Russian onion union. German deepweb links: Deutschland im Deep Web — german forum.
Non-English deepweb links: GTF — greek tor forum. Cipolla 2. PoliceTrack — Ne vous faites plus suivre par la police. Bibliotheca Alexandrina. French deep web community. Mar 10, Mar 11, Jul 5, Nov 3, Apr 23, Oct 6, Aug 23, Changed index to strchr. May 12, Feb 17, Aug 1, Fix logic bug. Apr 26, Jun 29, Dec 8, New CobaltStrike module.
Aug 20, May 21, Add the desktop launcher file. Mar 24, Add transparent PNG file to be used as icon. View code. This is the wish of the author and non-binding. Many people working in these organizations do not care for laws and ethics anyways. You are not one of the "good" ones if you ignore this.
This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects. Your help in writing, enhancing or fixing modules is highly appreciated!! It contains new features and new bugs.
Things might not work! For all other Linux derivates and BSD based systems, use the system software installer and look for similarly named libraries like in the command above. In all other cases, you have to download all source libraries and compile them manually. Generate them yourself.
A default password list is however present, use "dpl4hydra. Use a port scanner to see which protocols are enabled on the target. If you want to attack IPv6 addresses, you must add the "-6" command line option. All attacks are then IPv6 only! With -L for logins and -P for passwords you supply text files with entries. Many modules use this, a few require it! This session file is written every 5 minutes. NOTE: the hydra. It uses the same syntax. Via the -o command line option, the results can also be written to a file.
Using -b, the format of the output can be specified.
Orbot Прокси в комплекте с Tor Orbot - это свободная программа для прокси-соединений, она позволяет другим приложениям более безопасно использовать. Tor (иногда: торъ, торт, чиполлино, лук, расовая еврейская сеть Тор(а), по метаданным: Tor Browser делает на одно лицо только браузеры. Tor Browser, Comodo IceDragon и ещё два браузера для максимально безопасного и анонимного сёрфинга в интернете — в нашей подборке.