A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.
☆30Feb 25, 2017Updated 9 years ago
Alternatives and similar repositories for fingerprint-securedrop
Users that are interested in fingerprint-securedrop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- A repository of data around arrests on BART☆14Nov 8, 2018Updated 7 years ago
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Aug 25, 2017Updated 8 years ago
- An automated scanner and web dashboard for tracking TLS deployment across news organizations☆103Jan 5, 2022Updated 4 years ago
- Codes for WF attacks, defenses☆89Nov 23, 2023Updated 2 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆20Mar 29, 2016Updated 10 years ago
- ☆29Apr 13, 2026Updated 3 weeks ago
- End-to-End encrypted Tor2Web gateway☆38Oct 3, 2020Updated 5 years ago
- A crawler based on Tor Browser and Selenium☆55Mar 10, 2021Updated 5 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- repository for tracking open tasks☆17Dec 15, 2017Updated 8 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- use Slack as IRC client, or sync slack and IRC channel..!☆10Mar 14, 2019Updated 7 years ago
- The web site☆14Apr 12, 2023Updated 3 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- The decentralized social network.☆23Feb 16, 2016Updated 10 years ago
- ☆29May 6, 2021Updated 5 years ago
- A protocol testing platform that simulates network conditions and peer behavior to produce programmer-friendly benchmark data☆11Jan 4, 2019Updated 7 years ago
- Ansible Deflect configuration automation☆20Aug 16, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The public repository of the Loopix mix system☆72Sep 19, 2017Updated 8 years ago
- To generate decoy traffic against WF attack using GAN☆13Jul 17, 2025Updated 9 months ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 5 years ago
- Intuitive and configurable search interface for document archives.☆199Nov 11, 2019Updated 6 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 9 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- An adversarial stylometry application that seeks to help users evade authorship attribution.☆21Jun 18, 2015Updated 10 years ago
- ☆28Jul 4, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Surakav Implementation☆20May 14, 2024Updated last year
- Source code for the Observatory of Anonymity☆10Dec 5, 2022Updated 3 years ago
- timelock: time released encryption, encyption that anyone may decode without a key but only after a certain amount of time☆20May 1, 2017Updated 9 years ago
- PGPv4 long key-id collision test-cases; MitM keyserver PoC; script to safely import keys from keyservers☆35Feb 13, 2020Updated 6 years ago
- Tiny app to forward phone calls, record voicemail, bridge SMS to email☆22Feb 25, 2014Updated 12 years ago
- Pursuance Project splash page☆12Mar 3, 2023Updated 3 years ago
- 🔑 Command-line wrapper around RustySecrets, a Rust implementation of threshold Shamir's secret sharing.☆10Apr 1, 2018Updated 8 years ago