Contains python tools for performing website fingerprinting classification as well as fetching web-pages.
☆13Aug 27, 2022Updated 3 years ago
Alternatives and similar repositories for wf-tools
Users that are interested in wf-tools are comparing it to the libraries listed below
Sorting:
- This repository contains the code for the paper "Website Fingerprinting in the Age of QUIC" (PETS 2021).☆22Jul 12, 2023Updated 2 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- ☆19Oct 11, 2021Updated 4 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Dec 15, 2017Updated 8 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Apr 30, 2017Updated 8 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆195Mar 25, 2023Updated 2 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- Implementation of "Website Fingerprinting at Internet Scale"☆23Feb 24, 2023Updated 3 years ago
- ☆28May 6, 2021Updated 4 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆111Oct 9, 2023Updated 2 years ago
- ☆11Feb 28, 2022Updated 4 years ago
- ☆34Oct 10, 2018Updated 7 years ago
- ReoLink Discovery Protocol Integration for Home Assistant☆12Nov 8, 2023Updated 2 years ago
- Auto payout for your validators for Susbtrate blockchains☆10Feb 27, 2024Updated 2 years ago
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- ☆14Jan 21, 2022Updated 4 years ago
- REST API for tgsint telegram bot☆10Nov 11, 2023Updated 2 years ago
- ROSE: Robust Online Self-Adjusting Ensemble for Continual Learning from Imbalanced Drifting Data Streams☆10Jun 24, 2024Updated last year
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Reward payout service for substrate-based chains.☆12Jan 24, 2025Updated last year
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- 个人博客 https://enfangzhong.github.io/☆10Dec 7, 2022Updated 3 years ago
- System Audit Architecture with High Event Coverage and Synchronous Log Availability☆18Nov 27, 2024Updated last year
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- Collection of AWS Lambda functions in Python☆11Mar 13, 2019Updated 6 years ago
- get pcap feature☆10Sep 24, 2018Updated 7 years ago
- Tools to deploy a Polkadot/Kusama validator node.☆10Dec 27, 2024Updated last year
- Polski Antyirytujący Dodatek Specjalny ukrywa i blokuje elementy RSS oraz resztki po ukrytych newsletterach złączonych z elementami społe…☆10Updated this week
- Cyclops keeps a watchful eye on your Polkadot validators, giving you a clear vision of their performance and rewards.☆10Nov 30, 2024Updated last year
- ☆11Feb 6, 2019Updated 7 years ago
- UnsupervisedPapers.com is an open-source directory of papers on unsupervised machine learning and related topics with links to resources …☆10Dec 26, 2020Updated 5 years ago
- This script extracts the reviews from a given app store, it uses non-specific CSS selectors to prevent malfunctions in the future.☆10Oct 19, 2019Updated 6 years ago
- ☆13Aug 1, 2023Updated 2 years ago