☆18Aug 22, 2022Updated 3 years ago
Alternatives and similar repositories for IMProxy
Users that are interested in IMProxy are comparing it to the libraries listed below
Sorting:
- ☆24Mar 11, 2022Updated 4 years ago
- Implementation of AppScanner☆47Jul 29, 2022Updated 3 years ago
- ☆22Feb 14, 2020Updated 6 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆57Jan 15, 2024Updated 2 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆17Feb 27, 2025Updated last year
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- The repository of SiamHAN, an IPv6 address correlation model on TLS encrypted traffic. The work has been accepted as USENIX Security 2021…☆18Dec 1, 2021Updated 4 years ago
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated 2 years ago
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- ☆29May 6, 2021Updated 4 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- Tool to extract contents from the memory of Windows systems.☆13Jul 4, 2023Updated 2 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- ☆10Mar 11, 2023Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆61Jan 7, 2025Updated last year
- An automated smart contract vulnerability repair tool☆12Aug 15, 2023Updated 2 years ago
- This repository contains the code for the paper "Website Fingerprinting in the Age of QUIC" (PETS 2021).☆22Jul 12, 2023Updated 2 years ago
- It is a network traffic classifier based on deep learning.☆51Mar 16, 2024Updated 2 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆54Dec 31, 2021Updated 4 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- ☆12Jun 8, 2017Updated 8 years ago
- Self-attentive deep learning method for online traffic classification and its interpretability (CN21 & NetAI20)☆40Jun 27, 2024Updated last year
- AVCLASS++: Yet Another Massive Malware Labeling Tool☆13Dec 7, 2019Updated 6 years ago
- ☆12Jul 22, 2020Updated 5 years ago
- A scikit-learn-compatible module for Isolation-based anomaly detection using nearest-neighbor ensembles☆12Aug 30, 2023Updated 2 years ago
- Code for CVPR2018 "Iterative Learning with Open-set Noisy Labels"☆12Mar 12, 2021Updated 5 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆141Sep 27, 2025Updated 5 months ago
- ☆30Oct 7, 2025Updated 5 months ago
- ☆13Oct 20, 2020Updated 5 years ago
- Long Short-Term Memory Recurrent Neural Network for Traffic Prediction in Cellular Networks☆12Sep 28, 2020Updated 5 years ago
- Metarget技术交流群分享内容定期存档☆12Oct 22, 2021Updated 4 years ago
- ☆16May 9, 2022Updated 3 years ago
- Code from CCS paper: The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning☆13Feb 27, 2023Updated 3 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆32Aug 28, 2022Updated 3 years ago
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 10 years ago