A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.
☆11Aug 25, 2017Updated 8 years ago
Alternatives and similar repositories for webfp-crawler-phantomjs
Users that are interested in webfp-crawler-phantomjs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Apr 30, 2017Updated 9 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- A replicated implementation of the article 'DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning' in Tensorflow 2.3.☆12Jan 2, 2021Updated 5 years ago
- Codes for WF attacks, defenses☆89Nov 23, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- ☆19Oct 11, 2021Updated 4 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆55Dec 31, 2021Updated 4 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆51Nov 13, 2020Updated 5 years ago
- Detecting Tor Traffic using Deep Learning Techniques☆23Jul 27, 2020Updated 5 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆26Oct 28, 2017Updated 8 years ago
- ☆29Apr 13, 2026Updated 3 weeks ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Jun 30, 2019Updated 6 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- Create a virtual-dom streamgraph☆16Sep 14, 2017Updated 8 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- ☆11May 2, 2020Updated 6 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- A Python Wrapper To Retrieve Data From The CrowdTangle API☆11Mar 26, 2026Updated last month
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- Set of scripts to aid in the download of the GDELT data files from www.gdeltproject.org☆12May 17, 2014Updated 11 years ago
- Modernized version of Eric Brill's Part Of Speech tagger.☆15May 6, 2025Updated 11 months ago
- ☆10Feb 10, 2020Updated 6 years ago
- Cookiecutter template for testing Python scikit-learn clustering learners.☆15Aug 22, 2022Updated 3 years ago
- 2018年国际AIOps挑战赛KPI时序异常检测比赛基于OpenMLDB部署的工程化部署实践方案☆12Aug 30, 2022Updated 3 years ago
- Hexo Blog☆10Feb 7, 2025Updated last year
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Nov 28, 2016Updated 9 years ago
- my personal blog(https://lucifer.ren/blog/)☆10Mar 11, 2026Updated last month
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- JavaScript based graph visualization library with emphasis on customization and modularity.☆13Mar 21, 2019Updated 7 years ago
- ROSE: Robust Online Self-Adjusting Ensemble for Continual Learning from Imbalanced Drifting Data Streams☆10Jun 24, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- GUI版 EXP☆14Mar 20, 2019Updated 7 years ago