wisepythagoras / website-fingerprintingView external linksLinks
Deanonymizing Tor or VPN users with website fingerprinting and machine learning.
☆97Aug 15, 2024Updated last year
Alternatives and similar repositories for website-fingerprinting
Users that are interested in website-fingerprinting are comparing it to the libraries listed below
Sorting:
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Oct 2, 2020Updated 5 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆111Oct 9, 2023Updated 2 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- ☆28May 6, 2021Updated 4 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- ☆19Oct 11, 2021Updated 4 years ago
- ☆22Feb 14, 2020Updated 6 years ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Apr 21, 2023Updated 2 years ago
- 2018年国际AIOps挑战赛KPI时序异常检测比赛基于OpenMLDB部署的工程化部署实践方案☆12Aug 30, 2022Updated 3 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- FACEBOOK BOT SPAM SHARE The function of this tool is to share spam posts you want using the URL post from Facebook Lite. You need an ext…☆15Jan 11, 2024Updated 2 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- Networking IDS , network traffic classification with ML. Final Project for ECE-417.☆14Jan 21, 2020Updated 6 years ago
- A crawler based on Tor Browser and Selenium☆54Mar 10, 2021Updated 4 years ago
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- Navigation tool for Android☆21Apr 13, 2025Updated 10 months ago
- ☆20Mar 25, 2024Updated last year
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Sep 15, 2017Updated 8 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Jul 28, 2021Updated 4 years ago
- agurim: a multi-dimensional flow aggregation tool☆21Jul 5, 2019Updated 6 years ago
- ☆26Sep 20, 2023Updated 2 years ago
- using 2d-cnn to classify network traffic☆21Apr 10, 2020Updated 5 years ago
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆22Jul 9, 2020Updated 5 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- pocs of tested targets☆20Jul 25, 2018Updated 7 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- Anonymous Plurk Cross-matching Tool - Plurk偷偷說交叉比對工具☆23Dec 17, 2017Updated 8 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆64Jan 2, 2024Updated 2 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆54Dec 31, 2021Updated 4 years ago
- this scanner try to scan some dbbak or ctf #源码泄露☆23Feb 5, 2018Updated 8 years ago
- ☆24Nov 9, 2020Updated 5 years ago