kostassolo / dangers-of-human-touchView external linksLinks
Repository for the defense mechanism of the paper "The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions"
☆10Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for dangers-of-human-touch
Users that are interested in dangers-of-human-touch are comparing it to the libraries listed below
Sorting:
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Dec 7, 2021Updated 4 years ago
- Repository of the article "Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting"☆12Jun 4, 2019Updated 6 years ago
- Repo of code for FP-Scanner article☆13May 30, 2018Updated 7 years ago
- Easy to install, privacy protection browser setup. A collection of best browser extensions and configurations to help you fight for your …☆26Apr 24, 2020Updated 5 years ago
- Java interface to tauargus☆14Sep 26, 2025Updated 4 months ago
- ☆72Jan 1, 2022Updated 4 years ago
- This repo helps me compete in my Fantasy Football League.☆12Dec 8, 2022Updated 3 years ago
- A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels an…☆11Dec 9, 2025Updated 2 months ago
- POC of Canvas fingerprinting☆76Sep 11, 2018Updated 7 years ago
- ☆10Oct 18, 2024Updated last year
- Source code for the Observatory of Anonymity☆10Dec 5, 2022Updated 3 years ago
- browsing through the looking glass☆10Jul 10, 2023Updated 2 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆42Oct 19, 2022Updated 3 years ago
- A TC39 proposal for Intl.MessageFormat.parseResource()☆14Dec 1, 2022Updated 3 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- A module for pulling python license data from `environment.yaml` and `requirements.txt` files☆11Nov 23, 2018Updated 7 years ago
- Lightweight, low-dependency wrapper for basic WMI functionality on Windows.☆14Jan 27, 2026Updated 3 weeks ago
- Browser detection based on feature inspection☆27Feb 2, 2026Updated 2 weeks ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- ☆10Sep 4, 2020Updated 5 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated last year
- An exploit for Safari 17.4 and lower that enables fingerprinting Safari users using OffscreenCanvas and SharedWorkers even if fingerprint…☆15Sep 1, 2024Updated last year
- Etalab's Lab IA Pseudonymization Demo source code☆11Aug 3, 2023Updated 2 years ago
- Code and data for the CCS'19 paper "Watching You Watch: The Tracking Ecosystem of Over-the-TopTV Streaming Devices"☆13Dec 14, 2019Updated 6 years ago
- Collect ALL the crx files☆15Feb 26, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆12May 3, 2023Updated 2 years ago
- tfcrypt -- high security Threefish encryption tool.☆10Aug 9, 2023Updated 2 years ago
- Blockscout Docker image☆10Apr 29, 2020Updated 5 years ago
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 3 months ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- A simple Chrome extension allowing you to customise the names of tabs.☆10May 21, 2017Updated 8 years ago
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- AmIUnique extension for Chrome☆10Apr 3, 2019Updated 6 years ago
- ☆15Feb 10, 2026Updated last week
- Materials for the "Recommender Systems through the lens of Decision Theory" tutorial delivered at the 30th Web Conference (WWW '21).☆11Apr 13, 2021Updated 4 years ago