liangw89 / obfs-detection
Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"
☆24Updated 9 years ago
Alternatives and similar repositories for obfs-detection:
Users that are interested in obfs-detection are comparing it to the libraries listed below
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- ☆25Updated 2 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated last year
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Updated 9 years ago
- security machine learning☆72Updated 7 years ago
- A crawler based on Tor Browser and Selenium☆54Updated 4 years ago
- ☆47Updated 2 years ago
- Ender of Fast-Flux malicious domains.☆26Updated 10 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Packet Acumen☆19Updated 10 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 8 years ago
- ☆12Updated 7 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆39Updated 2 years ago
- Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret☆106Updated 6 years ago
- A simple utility to classify packets into flows. It's so simple that only one task is aimed to finish. For Deep Packet Inspection or flo…☆168Updated last year
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆65Updated 8 years ago
- ☆11Updated 7 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- ☆25Updated 8 years ago
- OpenFlow Honeypot☆23Updated 12 years ago
- The Tor Path Simulator☆86Updated 8 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- ☆33Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- A collection of known Domain Generation Algorithms☆66Updated 9 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Updated 9 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 7 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆36Updated 4 years ago