isec-tugraz / ChromeZeroLinks
Google Chrome extension implementing JavaScript Zero
☆151Updated 8 years ago
Alternatives and similar repositories for ChromeZero
Users that are interested in ChromeZero are comparing it to the libraries listed below
Sorting:
- Chrome extension to alert and possibly block IDN/Unicode websites and zero-day phishing websites using AI and Computer Vision.☆118Updated 7 years ago
- An audio firewall for Chrome!☆71Updated last year
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Fast TCP encryption☆212Updated 3 years ago
- It contains hardenedlinux community documentation.☆60Updated 2 years ago
- Public release of the RetroScope Android memory forensics framework☆119Updated 5 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Tool to disable Intel AMT on Windows☆146Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Artifacts for the USENIX publication.☆58Updated 6 years ago
- This Bash script just removes a pre-installed Telemetry, a pre-installed software and libs with some potentional or high risk. Script rem…☆101Updated 3 years ago
- SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-20…☆582Updated 6 years ago
- RIDL test suite and exploits☆359Updated 5 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Passive SSL client fingerprinting using handshake analysis.☆113Updated 8 years ago
- A browser extension to block unencrypted web traffic for added security.☆18Updated 10 years ago
- A platform to study browser fingerprinting☆73Updated 2 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- Public crawler and data from Tripwire: Inferring Internet Site Compromise☆95Updated 8 years ago
- WaitList.dat Parser☆26Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Run an isolated instance of a tor network in Docker containers☆164Updated 6 years ago
- Sandboxed, Rust-based, Windows Defender Client☆180Updated 8 years ago
- JavaScript Template Attack proof-of-concept implementation☆53Updated 7 years ago
- DEPRECATED: Firefox extension that shows you what JavaScript code runs on a web page, even if it is obfuscated and generated on the fly. …☆58Updated 8 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated last week
- ☆198Updated 9 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Tor traffic whitelisting gateway☆75Updated 7 months ago