fingerprintjs / external-protocol-flooding
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆645Updated last month
Alternatives and similar repositories for external-protocol-flooding:
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
- Surreptitiously exfiltrate data from the browser over DNS☆412Updated 4 years ago
- A demo for the no-JavaScript fingerprinting article☆508Updated 2 years ago
- Bypass Coudflare bot protection using Cloudflare Workers☆785Updated 3 years ago
- Bundle web files into a single image☆1,275Updated last year
- Behave! A monitoring browser extension for pages acting as "bad boi"☆331Updated 4 years ago
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xD☆342Updated 10 months ago
- Start a local HTTP server without any tools, just open a web page.☆636Updated 3 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,068Updated 2 years ago
- ⚠️ Browser fingerprinting via favicon!☆4,598Updated last year
- SSH-MITM - ssh audits made simple☆1,356Updated last month
- Preimage attack against NeuralHash 💣☆673Updated last year
- Check how trackable you are based on your browser extensions.☆546Updated last year
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆677Updated last year
- Browser-based network scanner & local-IP detection☆441Updated 3 years ago
- Binary encoding optimised for Twitter☆842Updated last month
- open source browser history page with analytics☆186Updated last year
- Scriptable desktop app to correct the perspective of images☆604Updated this week
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆797Updated 11 months ago
- ☆2,488Updated 2 years ago
- A collection of browser-based side channel attack vectors.☆745Updated 9 months ago
- Thirteen Years of Tor Attacks☆299Updated last year
- A tool for IDN homograph attacks and detection.☆730Updated 3 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆632Updated last year
- ☆1,115Updated 4 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆535Updated 3 years ago
- Design custom QR codes with this web app!☆433Updated last year
- The widget and docs for the proof of work challenge used in Friendly Captcha. Protect your websites and online services from spam and abu…☆426Updated 2 months ago
- Showcasing what in-app browsers do under the hood☆470Updated 2 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,487Updated 2 months ago
- The fucking source, build, and "infra" code☆275Updated last year