Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.
☆23Oct 30, 2020Updated 5 years ago
Alternatives and similar repositories for reWeFDE
Users that are interested in reWeFDE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Jun 30, 2019Updated 6 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆55Jun 14, 2024Updated last year
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆54Dec 31, 2021Updated 4 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆14Mar 5, 2026Updated last month
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆16Feb 27, 2024Updated 2 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- A tool for estimating a system's information leakage via Machine Learning☆10Jun 28, 2024Updated last year
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆197Mar 25, 2023Updated 3 years ago
- To generate decoy traffic against WF attack using GAN☆12Jul 17, 2025Updated 8 months ago
- ☆29May 6, 2021Updated 4 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆49Nov 13, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆45Dec 9, 2018Updated 7 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Aug 25, 2017Updated 8 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆39Jan 8, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Jun 10, 2020Updated 5 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 10 months ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- A network-level collaboration framework for personal mobile devices☆15Jun 24, 2020Updated 5 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- Python library for managing VirtualBox remotely using it's SOAP API☆20Feb 3, 2025Updated last year
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Mar 10, 2020Updated 6 years ago
- OVAL framework for BaB-based Neural Network Verification☆17Dec 18, 2025Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Mod for the game NERTS! Online☆14May 21, 2022Updated 3 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- This is a template project for Android Studio that allows you to create an android webview application in minutes. You can use it to crea…☆15Jul 4, 2023Updated 2 years ago
- a Lightning Network simulator☆21Jun 11, 2021Updated 4 years ago
- Symbolic execution for LLVM traces produced by PANDA☆40Feb 5, 2019Updated 7 years ago
- ☆21Oct 9, 2020Updated 5 years ago
- BADNET: A Blockchain-Based Decentralized Anonymity Network☆11Jul 1, 2025Updated 9 months ago