wisepythagoras / website-fingerprintingLinks
Deanonymizing Tor or VPN users with website fingerprinting and machine learning.
☆96Updated last year
Alternatives and similar repositories for website-fingerprinting
Users that are interested in website-fingerprinting are comparing it to the libraries listed below
Sorting:
- A crawler based on Tor Browser and Selenium☆55Updated 4 years ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆74Updated 2 years ago
- Run an isolated instance of a tor network in Docker containers☆165Updated 6 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Updated 8 years ago
- A tool to generate realistic private Tor network models, run them in Shadow, and analyze the results.☆39Updated 2 weeks ago
- ☆22Updated 5 years ago
- Multi-head SSH honeypot system.☆22Updated last year
- Collection of crawlers used by the ahmia search engine☆192Updated last month
- The AI VPN provides an security assessment of VPN clients' network traffic to identify cyber security threats.☆94Updated last year
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆95Updated last week
- ☆21Updated last year
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆70Updated 4 years ago
- Ahmia's elasticsearch index☆75Updated last month
- POOPAK - TOR Hidden Service Crawler☆136Updated last year
- ☆33Updated 7 years ago
- A tiny Tor client implementation (in pure python).☆134Updated 2 years ago
- An anomaly-based intrusion detection system.☆85Updated 2 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆128Updated last week
- Tor, I2P, ZeroNet, Freenet traffic data☆31Updated 4 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆57Updated 5 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆183Updated 5 months ago
- P2P botnet detection by tracking conversations☆28Updated 10 years ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆41Updated 5 years ago
- A simple, cross-platform utility to classify packets into flows using only the essential 4-tuple.☆172Updated 2 months ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆37Updated 5 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Updated last year
- Benchmarks for the k-FP WF attack☆31Updated 9 years ago