The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinting attacks.
☆29Jan 26, 2025Updated last year
Alternatives and similar repositories for Multitab-WF-Datasets
Users that are interested in Multitab-WF-Datasets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆165Apr 6, 2026Updated last week
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆66Jan 2, 2024Updated 2 years ago
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆14Mar 5, 2026Updated last month
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆55Jun 14, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆27Sep 20, 2023Updated 2 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆112Oct 9, 2023Updated 2 years ago
- This repository contains the source code for a network traffic occlusion framework presented at the 2025 IEEE Symposium on Security and P…☆28May 15, 2025Updated 10 months ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆197Mar 25, 2023Updated 3 years ago
- Surakav Implementation☆19May 14, 2024Updated last year
- ☆30Oct 7, 2025Updated 6 months ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆54Dec 31, 2021Updated 4 years ago
- ☆13May 15, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- To generate decoy traffic against WF attack using GAN☆12Jul 17, 2025Updated 8 months ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆49Nov 13, 2020Updated 5 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆23May 24, 2025Updated 10 months ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Fine-grained open-world Android app fingerprinting☆15Sep 4, 2022Updated 3 years ago
- ☆29May 6, 2021Updated 4 years ago
- ☆14Jul 14, 2019Updated 6 years ago
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆32Aug 28, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- [WWW'23] TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification☆130Jan 8, 2025Updated last year
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆16Feb 27, 2024Updated 2 years ago
- ☆13Feb 15, 2020Updated 6 years ago
- ☆19Oct 11, 2021Updated 4 years ago
- Dicoria 是一款根据网站响应识别内容管理系统 (CMS) 的工具。它利用各种技术和指纹识别方法来确定网站正在使用的 CMS。Dicoria is a tool used to identify Content Management Systems (CMS) base…☆12Dec 1, 2023Updated 2 years ago
- ☆22Jun 20, 2024Updated last year
- IPv6 analysis tool: the other side☆36Jan 5, 2014Updated 12 years ago
- 网络流量分类对比方法汇总☆206May 17, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [AAAI'25] Revolutionizing Encrypted Traffic Classification with MH-Net: A Multi-View Heterogeneous Graph Model☆67Dec 7, 2025Updated 4 months ago
- ☆16Jun 27, 2017Updated 8 years ago
- Dataset fingerprinting for AIBOM☆15Updated this week
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆20Jun 15, 2020Updated 5 years ago
- ☆28Jun 24, 2022Updated 3 years ago
- The repository of ET-BERT, a network traffic classification model on encrypted traffic. The work has been accepted as The Web Conference …☆624Nov 6, 2025Updated 5 months ago