fingerprintjs / external-protocol-floodingLinks
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆648Updated last year
Alternatives and similar repositories for external-protocol-flooding
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
Sorting:
- Bundle web files into a single image☆1,272Updated 2 years ago
- Start a local HTTP server without any tools, just open a web page.☆645Updated 4 years ago
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xD☆344Updated last year
- Surreptitiously exfiltrate data from the browser over DNS☆422Updated 5 years ago
- Bypass Coudflare bot protection using Cloudflare Workers☆789Updated 4 years ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆688Updated 2 years ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆345Updated 5 years ago
- SSH-MITM - ssh audits made simple☆1,427Updated last week
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆844Updated last year
- Pure Browser To Browser Chat (STUN & ICE Servers optional)☆255Updated 4 years ago
- Browser-based network scanner & local-IP detection☆467Updated 4 years ago
- Trojan Source: Invisible Vulnerabilities☆1,275Updated 2 years ago
- ☆1,109Updated 5 years ago
- A collection of browser-based side channel attack vectors.☆759Updated last year
- A tool for IDN homograph attacks and detection.☆741Updated 4 years ago
- Redirect attack on Shadowsocks stream ciphers☆395Updated 5 years ago
- Showcasing what in-app browsers do under the hood☆478Updated 3 years ago
- ☆2,511Updated 3 years ago
- alert(1) to win payloads☆50Updated 7 years ago
- open source browser history page with analytics☆188Updated 2 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,063Updated 3 years ago
- Create fake phone contacts, to do data-poisoning.☆567Updated 4 years ago
- Password-protect URLs using AES in the browser; create hidden bookmarks without a browser extension☆942Updated last year
- ☆271Updated 6 years ago
- Top Ten Web Hacking Techniques List☆756Updated 2 years ago
- Firefox Private Network Web Extension☆138Updated 2 years ago
- A MITM (monster-in-the-middle) detection tool. Used to build MALCOLM:☆814Updated last year
- dcp | Dat Copy - remote file copy, powered by the Dat protocol☆319Updated 2 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆534Updated 4 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆627Updated 2 years ago