☆22Feb 14, 2020Updated 6 years ago
Alternatives and similar repositories for doh_traffic_analysis
Users that are interested in doh_traffic_analysis are comparing it to the libraries listed below
Sorting:
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆19Jun 15, 2020Updated 5 years ago
- ☆18Aug 22, 2022Updated 3 years ago
- ☆29May 6, 2021Updated 4 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- This repository contains the code for the paper "Website Fingerprinting in the Age of QUIC" (PETS 2021).☆22Jul 12, 2023Updated 2 years ago
- ☆16Apr 8, 2025Updated 11 months ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- Original implementation of FlowPrint as in the NDSS '20 paper☆128Feb 8, 2023Updated 3 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆197Mar 25, 2023Updated 2 years ago
- 基于winpcap的数据包解析工具;比tshark更快。☆17Jul 1, 2020Updated 5 years ago
- Implementation of AppScanner☆47Jul 29, 2022Updated 3 years ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆139Oct 30, 2023Updated 2 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆164Mar 15, 2026Updated last week
- SSL/TLS layers for scapy the interactive packet manipulation tool☆10Feb 7, 2017Updated 9 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆71May 15, 2023Updated 2 years ago
- ☆27Sep 20, 2023Updated 2 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆17Jul 12, 2021Updated 4 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆19Oct 18, 2023Updated 2 years ago
- 基于appium框架开发的iOS端Money工具☆11Dec 14, 2022Updated 3 years ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Aug 11, 2025Updated 7 months ago
- Privacy-preserving EigenShare DEX☆12May 22, 2022Updated 3 years ago
- GQUIC Protocol Analyzer for Zeek (Bro) Network Security Monitor☆80Sep 13, 2023Updated 2 years ago
- How to create a valid polyglot HTML/JS/WebAssembly module -☆12Oct 15, 2020Updated 5 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆14Dec 7, 2021Updated 4 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Jan 26, 2025Updated last year
- Security papers about software vulnerabilities and exploits☆14Jan 16, 2019Updated 7 years ago
- ☆14Jun 26, 2022Updated 3 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Resources for private and secure Machine Learning and Artificial Intelligence☆12Jun 13, 2022Updated 3 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆65Jan 2, 2024Updated 2 years ago
- A general emoji-text translator which translates emoji-text to chinese☆14Oct 24, 2022Updated 3 years ago
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 3 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Demo Slack command that orders pizza☆11Sep 21, 2017Updated 8 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 2 years ago