wisepythagoras / website-fingerprintingLinks
Deanonymizing Tor or VPN users with website fingerprinting and machine learning.
☆96Updated last year
Alternatives and similar repositories for website-fingerprinting
Users that are interested in website-fingerprinting are comparing it to the libraries listed below
Sorting:
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Updated 8 years ago
- Collection of crawlers used by the ahmia search engine☆194Updated last week
- Run an isolated instance of a tor network in Docker containers☆164Updated 6 years ago
- An anomaly-based intrusion detection system.☆85Updated 2 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆39Updated last month
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆74Updated 2 years ago
- POOPAK - TOR Hidden Service Crawler☆136Updated last year
- Benchmarks for the k-FP WF attack☆31Updated 9 years ago
- Ahmia's elasticsearch index☆75Updated 2 months ago
- Datasets and code for IMC'19 paper on information exposure from IoT devices☆67Updated last year
- Tor, I2P, ZeroNet, Freenet traffic data☆31Updated 4 years ago
- ☆22Updated 5 years ago
- ☆26Updated 3 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆70Updated 4 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆50Updated 8 years ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆114Updated 2 months ago
- IotShark - Monitoring and Analyzing IoT Traffic☆93Updated 2 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
- Python project to crawl and scrap the lesser known deep web or one can say dark web. Just provide the onion link and get started.☆65Updated 7 years ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆57Updated 5 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆14Updated last year
- ☆33Updated 7 years ago
- censors pose a threat to the entire Internet☆139Updated 4 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- Automatically detected Relay Groups on the Tor Network☆14Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆129Updated this week
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- ☆21Updated last year
- Repository for the defense mechanism of the paper "The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"☆10Updated 3 years ago