A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.
☆30Feb 25, 2017Updated 9 years ago
Alternatives and similar repositories for fingerprint-securedrop
Users that are interested in fingerprint-securedrop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An automated scanner and web dashboard for tracking TLS deployment across news organizations☆103Jan 5, 2022Updated 4 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆20Mar 29, 2016Updated 10 years ago
- End-to-End encrypted Tor2Web gateway☆38Oct 3, 2020Updated 5 years ago
- DNS delegation path traceroute☆12May 17, 2016Updated 9 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- repository for tracking open tasks☆17Dec 15, 2017Updated 8 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- The web site☆15Apr 12, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- The decentralized social network.☆23Feb 16, 2016Updated 10 years ago
- paxrat is a utility to set PaX flags on a set of binaries.☆34Jun 27, 2018Updated 7 years ago
- A protocol testing platform that simulates network conditions and peer behavior to produce programmer-friendly benchmark data☆12Jan 4, 2019Updated 7 years ago
- Ansible Deflect configuration automation☆20Aug 16, 2022Updated 3 years ago
- The documentation and build system for the grsecurity kernel maintained by the Freedom of the Press Foundation for SecureDrop☆50Jul 7, 2020Updated 5 years ago
- To generate decoy traffic against WF attack using GAN☆12Jul 17, 2025Updated 8 months ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Intuitive and configurable search interface for document archives.☆199Nov 11, 2019Updated 6 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- Ghidra's Sleigh syntax highligther☆12Oct 18, 2019Updated 6 years ago
- A Rust implementation of the Lamport one-time signature scheme☆15Nov 30, 2022Updated 3 years ago
- gosignify is a Go reimplementation of OpenBSD's signify☆18Jan 5, 2026Updated 2 months ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Implements an encryptable machine (shapeCPU Java)☆11Aug 26, 2015Updated 10 years ago
- An adversarial stylometry application that seeks to help users evade authorship attribution.☆21Jun 18, 2015Updated 10 years ago
- Source code for the Observatory of Anonymity☆10Dec 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PGPv4 long key-id collision test-cases; MitM keyserver PoC; script to safely import keys from keyservers☆35Feb 13, 2020Updated 6 years ago
- ☆11Aug 20, 2024Updated last year
- Tiny app to forward phone calls, record voicemail, bridge SMS to email☆22Feb 25, 2014Updated 12 years ago
- Pursuance Project splash page☆12Mar 3, 2023Updated 3 years ago
- 🔑 Command-line wrapper around RustySecrets, a Rust implementation of threshold Shamir's secret sharing.☆10Apr 1, 2018Updated 7 years ago
- Election map for DC's 2014 general election☆21Feb 1, 2016Updated 10 years ago
- Website for the Magnum C++11 graphics engine☆18Updated this week