fingerprintjs / external-protocol-floodingLinks
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆646Updated 7 months ago
Alternatives and similar repositories for external-protocol-flooding
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
Sorting:
- A demo for the no-JavaScript fingerprinting article☆521Updated 3 years ago
- Bundle web files into a single image☆1,277Updated last year
- Surreptitiously exfiltrate data from the browser over DNS☆417Updated 4 years ago
- Bypass Coudflare bot protection using Cloudflare Workers☆790Updated 3 years ago
- Start a local HTTP server without any tools, just open a web page.☆640Updated 3 years ago
- SSH-MITM - ssh audits made simple☆1,389Updated 2 weeks ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆341Updated 4 years ago
- ☆1,117Updated 4 years ago
- ☆2,508Updated 2 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆806Updated last year
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xD☆342Updated last year
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆680Updated 2 years ago
- A tool for IDN homograph attacks and detection.☆737Updated 4 years ago
- Browser extension to spoof timezone, geolocation, locale and user agent.☆1,930Updated 6 months ago
- Browser-based network scanner & local-IP detection☆451Updated 4 years ago
- A site to test the interaction of web APIs and browser permissions.☆1,205Updated last month
- World’s single largest Internet domains dataset☆778Updated last month
- the JS/Node.JS library for encoding complex and unconventional data structures. Support for BigInts, TypedArrays, null, undefined, and Sy…☆201Updated 2 years ago
- A collection of browser-based side channel attack vectors.☆749Updated last year
- Showcasing what in-app browsers do under the hood☆474Updated 2 years ago
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆185Updated 4 years ago
- A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:☆811Updated last year
- Data exfiltration over DNS request covert channel☆867Updated last year
- open source browser history page with analytics☆186Updated 2 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,568Updated 7 months ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆536Updated 3 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆685Updated 3 years ago
- Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.☆328Updated 9 months ago
- Scriptable desktop app to correct the perspective of images☆618Updated last week
- GTRS - Google Translator Reverse Shell☆615Updated 8 months ago