UChicagoSUPERgroup / TrackingTransparencyCCS2019Links
☆11Updated 5 years ago
Alternatives and similar repositories for TrackingTransparencyCCS2019
Users that are interested in TrackingTransparencyCCS2019 are comparing it to the libraries listed below
Sorting:
- The technical standard for exchanging data rights requests☆63Updated 5 months ago
- Artifact release for our IEEE Symposium on Security and Privacy 2021 paper entitled Fingerprinting the Fingerprinters: Learning to Detect…☆71Updated 4 years ago
- This contains the data for our story "Who Is Collecting Data from Your Car?".☆43Updated 3 years ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 3 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Updated 2 years ago
- A preservation experiment to save photos from Flickr to your disk with the metadata embedded.☆17Updated 9 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- Code and data release for our PETS 2018 paper: "I never signed up for this! Privacy implications of email tracking".☆46Updated 3 years ago
- The FourthParty web measurement platform.☆44Updated 10 years ago
- Top Level Domain data☆69Updated 6 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Updated 8 years ago
- Python client and module for Vulnerability-Lookup.☆14Updated last month
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Updated this week
- Tranco: An improved top websites ranking☆168Updated 5 years ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Updated 4 months ago
- A configurable rule-based labeling tool for network flow files.☆17Updated 2 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Geolocate your files!☆16Updated 4 years ago
- Technical notes from investigations into COVID-19 contact-tracing apps☆50Updated 5 years ago
- Yet another way to find where to report an abuse☆30Updated 11 months ago
- Research into the lack of padding for responses in pwned passwords☆11Updated 5 years ago
- ☆36Updated 3 years ago
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆31Updated 4 years ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆21Updated 2 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆39Updated this week
- 📝 This repository contains dumps of the monthly "Chrome UX Report" (CrUX) datasets.☆44Updated 2 weeks ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Updated 7 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Updated 12 years ago