{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"BugHog","owner":"DistriNet","isFork":false,"description":"Powerful framework for pinpointing bug lifecycles in web browsers.","allTopics":["web-browser","entomology","dynamic-analysis-tools","usenix-security"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":5,"starsCount":8,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-18T15:01:30.631Z"}},{"type":"Public","name":"OAuch","owner":"DistriNet","isFork":false,"description":"OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations","allTopics":[],"primaryLanguage":{"name":"CSS","color":"#563d7c"},"pullRequestCount":0,"issueCount":1,"starsCount":5,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-15T20:39:03.958Z"}},{"type":"Public","name":"tranco-python-package","owner":"DistriNet","isFork":false,"description":"Python package to access the Tranco list","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":18,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-02T12:51:47.551Z"}},{"type":"Public","name":"BugHog-web","owner":"DistriNet","isFork":false,"description":"BugHog's dynamic web tests","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-21T09:12:12.835Z"}},{"type":"Public","name":"TC4SE","owner":"DistriNet","isFork":false,"description":"TC4SE is a secure communication mechanism designed for trusted execution environments like Intel SGX. It separates the process of remote attestation from the TLS handshake to maintain high security assurance while offering enhanced performance and ease of implementation.","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-16T10:52:57.297Z"}},{"type":"Public","name":"DLWF","owner":"DistriNet","isFork":false,"description":"Source code for our NDSS'18 paper \"Automated Website Fingerprinting through Deep Learning\"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":94,"forksCount":38,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-09T14:12:45.060Z"}},{"type":"Public","name":"timeless-timing-attacks","owner":"DistriNet","isFork":false,"description":"A Python implementation that facilitates finding timeless timing attack vulnerabilities.","allTopics":["attack","timing","vulnerability-detection"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":2,"starsCount":116,"forksCount":19,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-09T05:21:43.989Z"}},{"type":"Public","name":"utAPIa","owner":"DistriNet","isFork":false,"description":"utAPIa is a middleware that enhances APIs by enabling users to enforce privacy policies on data shared via OAuth delegations.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T10:35:44.181Z"}},{"type":"Public","name":"T3E","owner":"DistriNet","isFork":false,"description":"Trusted Time Extensions (T3E) is a novel solution that leverages TPM functionality to provide trusted time services in Intel SGX enclaves while protecting against common attacks.","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-07T14:57:49.233Z"}},{"type":"Public","name":"lifecycle-data","owner":"DistriNet","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-21T07:20:48.493Z"}},{"type":"Public","name":"DLTC","owner":"DistriNet","isFork":false,"description":"Source code and data for our PoPETS 2022.3 paper \"Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor\" ","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-30T23:03:12.547Z"}},{"type":"Public","name":"evil-epubs","owner":"DistriNet","isFork":false,"description":"Using EPUBs for the semi-automated evaluation of security and privacy implications of EPUB reading systems.","allTopics":["epub","epub-reader","epub3"],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":2,"issueCount":2,"starsCount":26,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-07-13T17:37:42.587Z"}},{"type":"Public","name":"leakbuster","owner":"DistriNet","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-06T23:14:52.903Z"}},{"type":"Public","name":"tta-demo","owner":"DistriNet","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-07-03T09:16:41.858Z"}},{"type":"Public","name":"mongodb-to-bigquery","owner":"DistriNet","isFork":false,"description":"Migrate data from MongoDB to BigQuery","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-04-10T07:09:26.677Z"}},{"type":"Public","name":"tranco-list","owner":"DistriNet","isFork":false,"description":"Tranco: An improved top websites ranking","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":4,"starsCount":121,"forksCount":15,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-05T15:27:32.393Z"}},{"type":"Public","name":"avalanche-ndss2020","owner":"DistriNet","isFork":false,"description":"Scripts and models of the NDSS 2020 paper \"A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints\"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-02-24T00:28:03.480Z"}},{"type":"Public","name":"xsr-framework","owner":"DistriNet","isFork":false,"description":"A framework for automatic testing of third-party request and cookie policy implementations","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":25,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-08-16T01:58:18.237Z"}}],"repositoryCount":18,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}