fingerprintjs / external-protocol-floodingLinks
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆648Updated last year
Alternatives and similar repositories for external-protocol-flooding
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
Sorting:
- A demo for the no-JavaScript fingerprinting article☆520Updated 3 years ago
- Surreptitiously exfiltrate data from the browser over DNS☆422Updated 5 years ago
- Bypass Coudflare bot protection using Cloudflare Workers☆789Updated 4 years ago
- The widget and docs for the proof of work challenge used in Friendly Captcha. Protect your websites and online services from spam and abu…☆445Updated 7 months ago
- Start a local HTTP server without any tools, just open a web page.☆645Updated 4 years ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆346Updated 5 years ago
- Pure Browser To Browser Chat (STUN & ICE Servers optional)☆255Updated 5 years ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆688Updated 2 years ago
- SSH-MITM - ssh audits made simple☆1,428Updated 2 weeks ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,063Updated 3 years ago
- Trojan Source: Invisible Vulnerabilities☆1,276Updated 2 years ago
- A tool for IDN homograph attacks and detection.☆741Updated 5 years ago
- Browser-based network scanner & local-IP detection☆467Updated 4 years ago
- open source browser history page with analytics☆188Updated 2 years ago
- Demo showcasing information leaks resulting from an IndexedDB same-origin policy violation in WebKit.☆100Updated 3 years ago
- ☆2,513Updated 3 years ago
- ☆271Updated 6 years ago
- ☆1,109Updated 5 years ago
- A collection of browser-based side channel attack vectors.☆759Updated last year
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,682Updated last year
- alert(1) to win payloads☆50Updated 7 years ago
- GitHub daily top 10 repos☆177Updated 3 years ago
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆188Updated 4 years ago
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆224Updated 4 years ago
- spy on the DNS queries your computer is making☆1,380Updated last year
- World’s single largest Internet domains dataset☆1,061Updated 3 weeks ago
- 为 Wireshark 能使用纯真网络 IP 数据库(QQwry)而提供的格式转换工具☆170Updated last year
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆534Updated 4 years ago
- Demo of tracking using etags instead of cookies (or localstorage or anything else)☆1,195Updated 10 months ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆833Updated 4 years ago