wisepythagoras / website-fingerprintingLinks
Deanonymizing Tor or VPN users with website fingerprinting and machine learning.
☆96Updated last year
Alternatives and similar repositories for website-fingerprinting
Users that are interested in website-fingerprinting are comparing it to the libraries listed below
Sorting:
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Run an isolated instance of a tor network in Docker containers☆164Updated 6 years ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆75Updated 2 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Updated 8 years ago
- Collection of crawlers used by the ahmia search engine☆202Updated this week
- Repository for the defense mechanism of the paper "The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"☆10Updated 3 years ago
- censors pose a threat to the entire Internet☆140Updated 4 years ago
- ☆22Updated 5 years ago
- Tor, I2P, ZeroNet, Freenet traffic data☆32Updated 4 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆120Updated last year
- An anomaly-based intrusion detection system.☆86Updated 2 years ago
- P2P botnet detection by tracking conversations☆28Updated 10 years ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆57Updated 5 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆187Updated 7 months ago
- Software responsible for extracting DDoS Fingerprints from traffic captures.☆70Updated 4 months ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆40Updated 2 months ago
- IotShark - Monitoring and Analyzing IoT Traffic☆93Updated 3 years ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆71Updated 4 years ago
- The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.☆93Updated last year
- Multi-head SSH honeypot system.☆22Updated last year
- POOPAK - TOR Hidden Service Crawler☆136Updated last week
- OSfooler-ng prevents remote active/passive OS fingerprinting by tools like nmap or p0f☆214Updated 2 years ago
- A tiny Tor client implementation (in pure python).☆133Updated 2 years ago
- ZMapv6: Internet Scanner with IPv6 capabilities☆116Updated 3 weeks ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆28Updated 7 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆95Updated last month
- Ahmia's elasticsearch index☆77Updated this week