Deanonymizing Tor or VPN users with website fingerprinting and machine learning.
☆97Aug 15, 2024Updated last year
Alternatives and similar repositories for website-fingerprinting
Users that are interested in website-fingerprinting are comparing it to the libraries listed below
Sorting:
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Apr 30, 2017Updated 8 years ago
- Source code for our NDSS'18 paper "Automated Website Fingerprinting through Deep Learning"☆111Oct 9, 2023Updated 2 years ago
- Implementation of "Website Fingerprinting at Internet Scale"☆24Feb 24, 2023Updated 3 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆197Mar 25, 2023Updated 2 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆49Nov 13, 2020Updated 5 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Aug 25, 2017Updated 8 years ago
- Encrypted Traffic Classification using Deep Learning☆50Jul 5, 2018Updated 7 years ago
- ☆34Oct 10, 2018Updated 7 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Jan 11, 2019Updated 7 years ago
- A KOP(Keen On Packet, 靠谱) DPI System which supports script rules which can describe behavior instead of application and performs triple s…☆17Jul 27, 2012Updated 13 years ago
- Networking IDS , network traffic classification with ML. Final Project for ECE-417.☆14Jan 21, 2020Updated 6 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- ☆16Jul 25, 2018Updated 7 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Feb 25, 2017Updated 9 years ago
- ☆20Mar 25, 2024Updated last year
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- Code for “MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints”☆22Jul 9, 2020Updated 5 years ago
- using 2d-cnn to classify network traffic☆21Apr 10, 2020Updated 5 years ago
- Benchmarks for the k-FP WF attack☆32Aug 24, 2016Updated 9 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆54Dec 31, 2021Updated 4 years ago
- ☆18Jan 17, 2024Updated 2 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Feb 24, 2020Updated 6 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Anonymous Plurk Cross-matching Tool - Plurk偷偷說交叉比對工具☆23Dec 17, 2017Updated 8 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated 2 years ago
- 网络在线流量分析系统☆26Jul 7, 2017Updated 8 years ago
- Telegram phishing is for testing purposes only and the security of users is responsible for any misuse☆10Feb 20, 2021Updated 5 years ago
- 基于流量数据的网络应用识别系统设计与实现☆25Dec 15, 2020Updated 5 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆55Jun 14, 2024Updated last year
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆23Nov 26, 2020Updated 5 years ago
- Simulator to apply splitting strategies as defense for WFP attacks☆16Feb 27, 2024Updated 2 years ago
- Linux dotfiles☆10Mar 12, 2026Updated last week
- agurim: a multi-dimensional flow aggregation tool☆21Jul 5, 2019Updated 6 years ago
- ☆12Oct 20, 2018Updated 7 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago