fingerprintjs / external-protocol-floodingLinks
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆647Updated 8 months ago
Alternatives and similar repositories for external-protocol-flooding
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
Sorting:
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xD☆342Updated last year
- Bundle web files into a single image☆1,277Updated 2 years ago
- Surreptitiously exfiltrate data from the browser over DNS☆417Updated 5 years ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆341Updated 5 years ago
- Bypass Coudflare bot protection using Cloudflare Workers☆792Updated 4 years ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆682Updated 2 years ago
- SSH-MITM - ssh audits made simple☆1,401Updated last week
- Pure Browser To Browser Chat (STUN & ICE Servers optional)☆256Updated 4 years ago
- Preimage attack against NeuralHash 💣☆671Updated 2 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆815Updated last year
- spy on the DNS queries your computer is making☆1,371Updated 11 months ago
- Binary encoding optimised for Twitter☆858Updated 2 weeks ago
- Browser-based network scanner & local-IP detection☆459Updated 4 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,069Updated 3 years ago
- A collection of browser-based side channel attack vectors.☆754Updated last year
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,595Updated 9 months ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆631Updated last year
- A tool for IDN homograph attacks and detection.☆738Updated 4 years ago
- Check if your VPN leaks your IP address via the WebRTC technology☆184Updated 7 years ago
- World’s single largest Internet domains dataset☆792Updated 3 weeks ago
- Firefox Private Network Web Extension☆139Updated 2 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 4 years ago
- Trojan Source: Invisible Vulnerabilities☆1,265Updated 2 years ago
- ☆270Updated 6 years ago
- ☆2,511Updated 2 years ago
- alert(1) to win payloads☆51Updated 6 years ago
- Showcasing what in-app browsers do under the hood☆476Updated 2 years ago
- A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:☆811Updated last year
- ☆1,118Updated 4 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,945Updated 2 years ago