shadow / tornettools
A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.
☆35Updated this week
Alternatives and similar repositories for tornettools:
Users that are interested in tornettools are comparing it to the libraries listed below
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆36Updated last year
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆49Updated 7 months ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆24Updated 7 months ago
- A Shadow plug-in that runs the Tor anonymity software☆49Updated 3 years ago
- ☆22Updated 2 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- Tor, I2P, ZeroNet, Freenet traffic data☆28Updated 3 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆12Updated 11 months ago
- Extracts and logs information from Tor's control port. Records and plays back Tor circuit building and stream assignment.☆10Updated last year
- ☆16Updated 5 years ago
- A crawler based on Tor Browser and Selenium☆55Updated 3 years ago
- Deanonymizing Tor or VPN users with website fingerprinting and machine learning.☆92Updated 5 months ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 5 years ago
- ☆21Updated last year
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
- Proteus: Programmable Protocols for Censorship Circumvention☆25Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆50Updated 3 years ago
- This tool is used for generating Manufacture Usage Description(MUD) from Device Traffic Trace(PCAP)☆31Updated 2 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆21Updated 4 years ago
- ☆16Updated 2 years ago
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆22Updated 4 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆82Updated last week
- Traffic analysis for Tor-based malware detection and classification☆39Updated last year
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Updated 8 years ago
- Zero Trust Network Framework☆10Updated 5 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year