fingerprintjs / external-protocol-flooding
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆646Updated 5 months ago
Alternatives and similar repositories for external-protocol-flooding
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
Sorting:
- A demo for the no-JavaScript fingerprinting article☆521Updated 2 years ago
- Surreptitiously exfiltrate data from the browser over DNS☆417Updated 4 years ago
- Bundle web files into a single image☆1,276Updated last year
- Start a local HTTP server without any tools, just open a web page.☆640Updated 3 years ago
- Bypass Coudflare bot protection using Cloudflare Workers☆790Updated 3 years ago
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xD☆341Updated last year
- open source browser history page with analytics☆186Updated 2 years ago
- ☆2,504Updated 2 years ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆337Updated 4 years ago
- A collection of browser-based side channel attack vectors.☆746Updated last year
- A tool for IDN homograph attacks and detection.☆735Updated 4 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆630Updated last year
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆677Updated 2 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆804Updated last year
- Browser-based network scanner & local-IP detection☆450Updated 4 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆824Updated 3 years ago
- SSH-MITM - ssh audits made simple☆1,382Updated 2 months ago
- The widget and docs for the proof of work challenge used in Friendly Captcha. Protect your websites and online services from spam and abu…☆435Updated last month
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,539Updated 6 months ago
- Wikipedia using only static assets & no backend☆574Updated 3 years ago
- Preimage attack against NeuralHash 💣☆669Updated 2 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆624Updated 4 years ago
- ☆1,118Updated 4 years ago
- Pure Browser To Browser Chat (STUN & ICE Servers optional)☆253Updated 4 years ago
- Create fake phone contacts, to do data-poisoning.☆562Updated 4 years ago
- ☆1,266Updated last week
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆686Updated 3 years ago
- Python package for freepn network daemon☆293Updated 3 years ago
- a CTF web challenge about making screenshots☆225Updated 3 years ago
- Send Morse code via ⏮️ ⏸️ ⏯️☆413Updated 6 months ago