fingerprintjs / external-protocol-floodingLinks
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆648Updated 9 months ago
Alternatives and similar repositories for external-protocol-flooding
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
Sorting:
- Bundle web files into a single image☆1,276Updated 2 years ago
- A demo for the no-JavaScript fingerprinting article☆522Updated 3 years ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆341Updated 5 years ago
- Start a local HTTP server without any tools, just open a web page.☆644Updated 3 years ago
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xD☆343Updated last year
- Pure Browser To Browser Chat (STUN & ICE Servers optional)☆256Updated 4 years ago
- Bypass Coudflare bot protection using Cloudflare Workers☆790Updated 4 years ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆684Updated 2 years ago
- The widget and docs for the proof of work challenge used in Friendly Captcha. Protect your websites and online services from spam and abu…☆445Updated 2 months ago
- SSH-MITM - ssh audits made simple☆1,405Updated last month
- Demo showcasing information leaks resulting from an IndexedDB same-origin policy violation in WebKit.☆101Updated 2 years ago
- Preimage attack against NeuralHash 💣☆672Updated 2 years ago
- Showcasing what in-app browsers do under the hood☆476Updated 3 years ago
- spy on the DNS queries your computer is making☆1,372Updated last year
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆817Updated last year
- Browser-based network scanner & local-IP detection☆462Updated 4 years ago
- World’s single largest Internet domains dataset☆799Updated last month
- A collection of browser-based side channel attack vectors.☆753Updated last year
- ☆2,513Updated 2 years ago
- Binary encoding optimised for Twitter☆859Updated last month
- Trojan Source: Invisible Vulnerabilities☆1,265Updated 2 years ago
- ⚠️ Browser fingerprinting via favicon!☆4,701Updated 2 years ago
- A tool for IDN homograph attacks and detection.☆738Updated 4 years ago
- Browser extension to spoof timezone, geolocation, locale and user agent.☆1,954Updated 8 months ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,068Updated 3 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆631Updated 2 years ago
- ☆270Updated 6 years ago
- A site to test the interaction of web APIs and browser permissions.☆1,204Updated 2 weeks ago
- CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻☆226Updated 4 years ago
- Top Ten Web Hacking Techniques List☆748Updated last year