fingerprintjs / external-protocol-floodingLinks
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆646Updated 6 months ago
Alternatives and similar repositories for external-protocol-flooding
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
Sorting:
- A demo for the no-JavaScript fingerprinting article☆521Updated 2 years ago
- Surreptitiously exfiltrate data from the browser over DNS☆417Updated 4 years ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆340Updated 4 years ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆679Updated 2 years ago
- Bundle web files into a single image☆1,277Updated last year
- Demo showcasing information leaks resulting from an IndexedDB same-origin policy violation in WebKit.☆101Updated 2 years ago
- Pure Browser To Browser Chat (STUN & ICE Servers optional)☆254Updated 4 years ago
- A tool for IDN homograph attacks and detection.☆737Updated 4 years ago
- JavaScript Restrictor web extension☆261Updated last month
- A collection of browser-based side channel attack vectors.☆749Updated last year
- Start a local HTTP server without any tools, just open a web page.☆639Updated 3 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,553Updated 7 months ago
- ☆17Updated last week
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆804Updated last year
- spy on the DNS queries your computer is making☆1,368Updated 9 months ago
- ☆2,508Updated 2 years ago
- SSH-MITM - ssh audits made simple☆1,385Updated 2 months ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆630Updated last year
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xD☆343Updated last year
- ☆1,118Updated 4 years ago
- Browser-based network scanner & local-IP detection☆450Updated 4 years ago
- open source browser history page with analytics☆186Updated 2 years ago
- Create fake phone contacts, to do data-poisoning.☆565Updated 4 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,924Updated 2 years ago
- A super simple script which uses the GitHub API to convert your markdown files to GitHub styled HTML site.☆218Updated 3 years ago
- PoC for CVE-2021-3156 (sudo heap overflow)☆435Updated 3 years ago
- Python package for freepn network daemon☆293Updated 3 years ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆843Updated 2 years ago
- Trojan Source: Invisible Vulnerabilities☆1,260Updated 2 years ago
- Pure CSS device fingerprinting.☆297Updated 3 years ago