cool project
☆20Jan 18, 2021Updated 5 years ago
Alternatives and similar repositories for deeppacket
Users that are interested in deeppacket are comparing it to the libraries listed below
Sorting:
- Pytorch implementation of deep packet: a novel approach for encrypted traffic classification using deep learning☆248Mar 1, 2023Updated 2 years ago
- get pcap feature☆10Sep 24, 2018Updated 7 years ago
- Networking IDS , network traffic classification with ML. Final Project for ECE-417.☆14Jan 21, 2020Updated 6 years ago
- using 2d-cnn to classify network traffic☆21Apr 10, 2020Updated 5 years ago
- Analysis of the ISCX VPN-nonVPN Dataset 2016 for Encrypted Network Traffic Classification☆94Jan 2, 2024Updated 2 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- using deep learning to classify the encrypted network traffic☆169Dec 16, 2020Updated 5 years ago
- ☆28May 6, 2021Updated 4 years ago
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆127May 1, 2023Updated 2 years ago
- ☆10Dec 30, 2020Updated 5 years ago
- Practice typing and improve your typing speed (WPM).☆10Aug 20, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆60Dec 7, 2025Updated 2 months ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Implementation of AppScanner☆46Jul 29, 2022Updated 3 years ago
- exploit-db备份☆14Jan 5, 2022Updated 4 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- 网络流量分类对比方法汇总☆206May 17, 2025Updated 9 months ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- 个人博客 https://enfangzhong.github.io/☆10Dec 7, 2022Updated 3 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- ☆13Mar 1, 2024Updated last year
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Code for “FS-Net: A Flow Sequence Network For Encrypted Traffic Classification”☆118Jul 9, 2020Updated 5 years ago
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Audit du SMSI selon l'ISO 27001☆13Feb 23, 2022Updated 4 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- ☆12Mar 4, 2023Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- This is a recommended paper list for the course of Privacy Computing.☆10Mar 26, 2024Updated last year