pankajb64 / webfp-crawler-phantomjsLinks
A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.
☆11Updated 7 years ago
Alternatives and similar repositories for webfp-crawler-phantomjs
Users that are interested in webfp-crawler-phantomjs are comparing it to the libraries listed below
Sorting:
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆96Updated 10 months ago
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- ☆25Updated 3 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated last year
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Ender of Fast-Flux malicious domains.☆27Updated 10 years ago
- ☆22Updated last year
- ☆6Updated 6 years ago
- develop 1) an on-path DNS packet injector, and 2) a passive DNS poisoning attack detector. Part 1: The DNS packet injector you are goin…☆18Updated 7 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Updated 4 years ago
- Tor, I2P, ZeroNet, Freenet traffic data☆32Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 4 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆21Updated 3 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Updated 2 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆22Updated 4 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆23Updated 4 years ago
- Hunting cryptonote-related miners☆22Updated 4 years ago
- Some of the presentations given by me☆18Updated 7 months ago
- ☆16Updated 6 years ago
- Automatic Feature Generation for Website Fingerprinting☆31Updated 8 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆36Updated 4 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 9 years ago
- ☆22Updated 5 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆38Updated 4 months ago