☆20Jun 30, 2019Updated 6 years ago
Alternatives and similar repositories for InfoLeakWebsiteFingerprint
Users that are interested in InfoLeakWebsiteFingerprint are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆16Feb 27, 2024Updated 2 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆65Jan 2, 2024Updated 2 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- ☆19Oct 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆112Oct 9, 2023Updated 2 years ago
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- A crawler based on Tor Browser and Selenium☆55Mar 10, 2021Updated 5 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆49Nov 13, 2020Updated 5 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- ☆27Sep 20, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆198Mar 25, 2023Updated 3 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- Code for our 2024 ACM AsiaCCS Paper "Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact"☆17Dec 19, 2025Updated 3 months ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆165Mar 15, 2026Updated 2 weeks ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- This novel black-box web vulnerability scanner attempts to infer the state machine of the web application.☆19Mar 12, 2020Updated 6 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Jan 26, 2025Updated last year
- To generate decoy traffic against WF attack using GAN☆12Jul 17, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 支持自定义和扩展的流量捕捉工具☆17Feb 8, 2026Updated last month
- The 2024 HTTP Workshop☆11Jan 8, 2025Updated last year
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Aug 25, 2017Updated 8 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 10 months ago
- ☆16Oct 23, 2019Updated 6 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- This is the repository for JÄk. I created it as prototype during my masterthesis.☆31Jan 22, 2018Updated 8 years ago
- A general emoji-text translator which translates emoji-text to chinese☆14Oct 24, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implementation of "Website Fingerprinting at Internet Scale"☆24Feb 24, 2023Updated 3 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Jun 12, 2019Updated 6 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- CryptoBib Main Repository for Developers☆22Aug 21, 2024Updated last year
- Tor Browser automation with Selenium.☆586Jul 26, 2025Updated 8 months ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆21Aug 15, 2022Updated 3 years ago
- Scripts & snippets☆14Mar 18, 2026Updated last week