Skip to content
This repository has been archived by the owner on Dec 6, 2021. It is now read-only.
/ TorMalware-Research Public archive

Old research, circa 2011, for making a Tor enabled hacking tool POC

Notifications You must be signed in to change notification settings

WWelna/TorMalware-Research

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Tor Malware Research

This is some old Proof of Concept code involving seeing if it's possible to make a compact Tor client for usage in Malware.

Notes

The theory behind this Proof of Concept is many of the listed Tor relays and Exit Nodes have port 9050 open, which is the SOCKS5 proxy used to "access" the Tor Network. By scanning for them, and keeping a list of reliable ones with high uptime, you can in effect, make a primative Tor Client that can connect to a hidden onion service to send and receive data. This is the result of that research into this, and likely no longer works without a lot of reworking of the code, as it's from 2011, and I have no desire to update any of the code to working status.

This was a precursor to Pandora-OOC with the usage of OOC methods to obfuscate the executable.

Build Instructions

It uses TCC and that's about it as far as I can remember.

License

/* =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 *                                  Tor-Locate
 * =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 * Copyright (C) 2011, William H. Welna All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *     * Redistributions of source code must retain the above copyright
 *       notice, this list of conditions and the following disclaimer.
 *     * Redistributions in binary form must reproduce the above copyright
 *       notice, this list of conditions and the following disclaimer in the
 *       documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY William H. Welna ''AS IS'' AND ANY
 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
 * DISCLAIMED. IN NO EVENT SHALL William H. Welna BE LIABLE FOR ANY
 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 * =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 */

About

Old research, circa 2011, for making a Tor enabled hacking tool POC

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages