fingerprintjs / external-protocol-flooding
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
☆646Updated 3 months ago
Alternatives and similar repositories for external-protocol-flooding:
Users that are interested in external-protocol-flooding are comparing it to the libraries listed below
- A demo for the no-JavaScript fingerprinting article☆510Updated 2 years ago
- Behave! A monitoring browser extension for pages acting as "bad boi"☆332Updated 4 years ago
- Surreptitiously exfiltrate data from the browser over DNS☆414Updated 4 years ago
- A tool for IDN homograph attacks and detection.☆731Updated 4 years ago
- The widget and docs for the proof of work challenge used in Friendly Captcha. Protect your websites and online services from spam and abu…☆428Updated 3 months ago
- Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise☆677Updated last year
- Check how trackable you are based on your browser extensions.☆556Updated last year
- Bundle web files into a single image☆1,274Updated last year
- A collection of browser-based side channel attack vectors.☆745Updated 11 months ago
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xD☆340Updated last year
- An open letter against Apple's new privacy-invasive client-side content scanning.☆632Updated last year
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,499Updated 3 months ago
- Create fake phone contacts, to do data-poisoning.☆563Updated 3 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆800Updated last year
- Start a local HTTP server without any tools, just open a web page.☆638Updated 3 years ago
- Showcasing what in-app browsers do under the hood☆474Updated 2 years ago
- Preimage attack against NeuralHash 💣☆672Updated last year
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆180Updated 3 years ago
- Check if your VPN leaks your IP address via the WebRTC technology☆180Updated 6 years ago
- A proof-of-concept Android application to detect and defeat some of the Cellebrite UFED forensic toolkit extraction techniques.☆333Updated 7 months ago
- ☆1,115Updated 4 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- ☆2,493Updated 2 years ago
- The fucking source, build, and "infra" code☆275Updated last year
- Python package for freepn network daemon☆293Updated 3 years ago
- Pure Browser To Browser Chat (STUN & ICE Servers optional)☆251Updated 4 years ago
- Trojan Source: Invisible Vulnerabilities☆1,250Updated last year
- spy on the DNS queries your computer is making☆1,358Updated 5 months ago
- open source browser history page with analytics☆186Updated last year
- IP lookup by favicon using Shodan☆1,151Updated 2 weeks ago