Spirals-Team / FPStalkerLinks
Repo of code for FPStalker article
☆32Updated 8 years ago
Alternatives and similar repositories for FPStalker
Users that are interested in FPStalker are comparing it to the libraries listed below
Sorting:
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 6 years ago
- Simple heuristic for measuring web page similarity (& data set)☆90Updated last week
- This is a research project for dynamic fingerprinting, which means even some user change features of their computer, we can still fingerp…☆38Updated 7 years ago
- A browser to counter advanced fingerprinting techniques☆59Updated 5 years ago
- Compare html similarity using structural and style metrics☆218Updated 2 years ago
- Modular static malicious JavaScript detection system☆75Updated 5 years ago
- Tool to mitigate browser fingerprint tracking☆47Updated 4 years ago
- Public code release for The Web Never Forgets paper☆69Updated 4 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Repo of code for FP-Scanner article☆13Updated 7 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 4 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆72Updated 4 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Updated 9 years ago
- Python wrapper for ssdeep fuzzy hashing library☆151Updated 4 years ago
- awesome security paper☆155Updated 10 years ago
- Extract relationships between cyber security entities within unstructured text☆24Updated 7 years ago
- An extended Node.js runtime with additional security mechanisms built-in. Protects your Node.js applications from injection attacks such …☆31Updated 4 years ago
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18Updated 4 years ago
- Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret☆108Updated 7 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- Signature-free approach library to detect injection and commanding attacks☆98Updated 4 years ago
- A collection of known Domain Generation Algorithms☆67Updated 9 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆133Updated 4 years ago
- ☆30Updated 4 years ago
- ☆18Updated 7 years ago
- Package to facilitate URL clustering☆71Updated 9 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆31Updated 8 years ago
- Speedy Camera Fingerprinting Library☆23Updated 3 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆41Updated 3 years ago
- Python Chained Generators for Network Streams:☆40Updated 5 years ago