background preloader

Closerlooksearch

izik | take search for a joy ride Search Carrot 2 Carrot2 Search Results Clustering Engine Carrot2 organizes your search results into topics. With an instant overview of what's available, you will quickly find what you're looking for. Choose where to search: Type your query: More options More advanced options Hide advanced options Example queries: data mining | london | clustering About Carrot2: Carrot2 is an Open Source Search Results Clustering Engine. Ordo Novi Templi (ONT) Working Links To The Deep Web Hidden Wikis Index pages in Wiki-based format. The Hidden Wiki - The original Hidden Wiki (after Matt's), owned by ion. Other indexes Other places/directories you may be able to find links. OnionBookmark - Keep bookmarks private or share with public. Search engines Google for Tor. Grizzly Search Engine - New search engine. Other general stuff to see Starting places. Tor WebDesign Guidelines - Suggestions to start making your own Hidden Service. Marketplace See also: The separate Drugs and Erotica sections for those specific services. Reviews of the marketplace experience does not belong to the list below. Be wary when using any of these services, especially Commercial. Financial Services Currencies, banks, money markets, clearing houses, exchangers. Banker and Co. - Professional money laundering and consultation service. Commercial Services DiamondsandGold - Sells stolen diamonds and gold. Scams / Likely Scams Stolen Mac Store - We have many products, contact at apple@tormail.net. Filesharing

Social Searcher MyLife™ Cover Browser Wehrmann, astrologue nazi p0f v3 Copyright (C) 2012 by Michal Zalewski <lcamtuf@coredump.cx> Yeah, it's back! 1. P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Some of p0f's capabilities include: Highly scalable and extremely fast identification of the operating system and software on both endpoints of a vanilla TCP connection - especially in settings where NMap probes are blocked, too slow, unreliable, or would simply set off alarms. Common uses for p0f include reconnaissance during penetration tests; routine network monitoring; detection of unauthorized network interconnects in corporate environments; providing signals for abuse-prevention tools; and miscellanous forensics. You can read more about its design and operation in this document. Fun fact: The idea for p0f dates back to June 10, 2000. 2. 3. 4. 5.

Qrobe AllExperts Cognitive Files Schwartz-Bostunicht

Related: