wisepythagoras / website-fingerprintingLinks
Deanonymizing Tor or VPN users with website fingerprinting and machine learning.
☆96Updated last year
Alternatives and similar repositories for website-fingerprinting
Users that are interested in website-fingerprinting are comparing it to the libraries listed below
Sorting:
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- Run an isolated instance of a tor network in Docker containers☆164Updated 6 years ago
- Tor, I2P, ZeroNet, Freenet traffic data☆32Updated 4 years ago
- An anomaly-based intrusion detection system.☆85Updated 3 years ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆77Updated 2 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Updated 8 years ago
- ☆27Updated 3 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- POOPAK - TOR Hidden Service Crawler☆135Updated last month
- Benchmarks for the k-FP WF attack☆32Updated 9 years ago
- ☆34Updated 7 years ago
- A curated list of awesome Internet port and host scanners, plus related components and much more, with a focus on free and open source pr…☆235Updated 3 years ago
- Automatically detected Relay Groups on the Tor Network☆14Updated 2 years ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆57Updated 5 years ago
- Python project to crawl and scrap the lesser known deep web or one can say dark web. Just provide the onion link and get started.☆69Updated 7 years ago
- Encrypted botnet traffic generator☆11Updated 9 years ago
- P2P botnet detection by tracking conversations☆28Updated 10 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆89Updated 2 years ago
- Multi-head SSH honeypot system.☆23Updated last year
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Updated 5 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Updated 8 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆134Updated 3 weeks ago
- Sniff plaintext account/password/cookie on router☆53Updated 5 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 8 years ago
- censors pose a threat to the entire Internet☆140Updated 4 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆96Updated last month
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- Collection of crawlers used by the ahmia search engine☆206Updated last month
- IotShark - Monitoring and Analyzing IoT Traffic☆92Updated 3 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago