☆28Jun 24, 2022Updated 3 years ago
Alternatives and similar repositories for deepcoffea
Users that are interested in deepcoffea are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆34Oct 10, 2018Updated 7 years ago
- ☆27Sep 20, 2023Updated 2 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆17Nov 26, 2025Updated 4 months ago
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆44Mar 26, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Surakav Implementation☆19May 14, 2024Updated last year
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- ☆22Jun 20, 2024Updated last year
- ☆29May 6, 2021Updated 4 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Aug 25, 2017Updated 8 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆16Feb 27, 2024Updated 2 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 用于检测网站是否使用了CDN机制。☆20Sep 19, 2020Updated 5 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Jan 26, 2025Updated last year
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- Code for USENIX'18 paper: "Effective Detection of Multimedia Protocol Tunneling using Machine Learning"☆11Nov 19, 2021Updated 4 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- ☆20Jun 1, 2022Updated 3 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- A protocol testing platform that simulates network conditions and peer behavior to produce programmer-friendly benchmark data☆12Jan 4, 2019Updated 7 years ago
- Ansible Deflect configuration automation☆20Aug 16, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Shadow plug-in that runs the Tor anonymity software☆50Jun 15, 2021Updated 4 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14May 23, 2018Updated 7 years ago
- openaps driver for Dexcom G4 with Share BLE☆11Sep 13, 2017Updated 8 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- berlin automatic mail encryption meetup 2016☆13Dec 16, 2016Updated 9 years ago
- Repository for Tor's DNS-related issues.☆17Dec 19, 2016Updated 9 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆49Nov 13, 2020Updated 5 years ago
- LSPosed Framework☆20Jan 19, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Tor Browser automation with Selenium.☆586Jul 26, 2025Updated 8 months ago
- Implementation of LDFI for Akka programs in Scala☆15Sep 27, 2018Updated 7 years ago
- Replication files for arXiv:1803.10769 Network Traffic Anomaly Detection Using Recurrent Neural Networks☆24Jan 6, 2019Updated 7 years ago
- Encrypted Network Traffic Classification using Deep Learning☆59Apr 3, 2024Updated last year
- ☆12Dec 26, 2017Updated 8 years ago
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆48Aug 10, 2020Updated 5 years ago