mirror of
				https://github.com/arkenfox/user.js.git
				synced 2025-10-31 13:55:26 +01:00 
			
		
		
		
	Updated Appendix C: Test Sites (markdown)
| @@ -3,64 +3,64 @@ Here is list of various websites in which to test your browser. You should enabl | ||||
| If you would like to submit a test page to be added to this list, please post the details [here](https://github.com/ghacksuserjs/ghacks-user.js/issues/6) for consideration, thanks. | ||||
|  | ||||
| ### 1. Fingerprinting | ||||
| - [Panopticlick](https://panopticlick.eff.org/) | ||||
| - [JoDonym](http://ip-check.info/?lang=en) | ||||
| - [Am I Unique?](https://amiunique.org/) | ||||
| - [Browserprint](https://browserprint.info/test) | ||||
| - [Unique Machine](http://www.uniquemachine.org/) | ||||
| - [Panopticlick](https://panopticlick.eff.org/) - https*:*//panopticlick.eff.org/ | ||||
| - [JoDonym](http://ip-check.info/?lang=en) - http*:*//ip-check.info/?lang=en | ||||
| - [Am I Unique?](https://amiunique.org/) - https*:*//amiunique.org/ | ||||
| - [Browserprint](https://browserprint.info/test) - https*:*//browserprint.info/test | ||||
| - [Unique Machine](http://www.uniquemachine.org/) - http*:*//www.uniquemachine.org/ | ||||
|  | ||||
| ### 2. Multiple Tests [single page] | ||||
| - [Whoer](https://whoer.net/) | ||||
| - [5who](http://5who.net/?type=extend) | ||||
| - [IP/DNS Leak](https://ipleak.net/) | ||||
| - [IP Duh](http://ipduh.com/anonymity-check/) | ||||
| - [Do I Leak?](https://www.doileak.com/) | ||||
| - [Whoer](https://whoer.net/) - https*:*//whoer.net/ | ||||
| - [5who](http://5who.net/?type=extend) - http*:*//5who.net/?type=extend | ||||
| - [IP/DNS Leak](https://ipleak.net/) - https*:*//ipleak.net/ | ||||
| - [IP Duh](http://ipduh.com/anonymity-check/) - http*:*//ipduh.com/anonymity-check/ | ||||
| - [Do I Leak?](https://www.doileak.com/) - https*:*//www.doileak.com/ | ||||
|  | ||||
| ### 3. Multiple Tests [multi-page] | ||||
| - [BrowserSpy.dk](http://browserspy.dk/) | ||||
| - [BrowserLeaks](https://www.browserleaks.com/) | ||||
| - [HTML Security](https://html5sec.org/) | ||||
| - [PC Flank](http://www.pcflank.com/index.htm)   | ||||
| - [BrowserSpy.dk](http://browserspy.dk/) - http*:*//browserspy.dk/ | ||||
| - [BrowserLeaks](https://www.browserleaks.com/) - https*:*//www.browserleaks.com/ | ||||
| - [HTML Security](https://html5sec.org/) - https*:*//html5sec.org/ | ||||
| - [PC Flank](http://www.pcflank.com/index.htm) - http*:*//www.pcflank.com/index.htm | ||||
|  | ||||
| ### 4. Encryption / Ciphers / SSL/TLS / Certificates | ||||
| - [BadSSL](https://badssl.com/) | ||||
| - [DCSec](https://cc.dcsec.uni-hannover.de/) | ||||
| - [Qualys SSL Labs](https://www.ssllabs.com/ssltest/viewMyClient.html) | ||||
| - [Fortify](https://www.fortify.net/sslcheck.html) | ||||
| - [How's My SSL](https://www.howsmyssl.com/) | ||||
| - [RC4](https://rc4.io/) | ||||
| - [Heartbleed](https://filippo.io/Heartbleed/) | ||||
| - [Freak Attack](https://freakattack.com/clienttest.html) | ||||
| - [Logjam](https://weakdh.org/) | ||||
| - [Symantec](https://cryptoreport.websecurity.symantec.com/checker/views/sslCheck.jsp) | ||||
| - [BadSSL](https://badssl.com/) - https*:*//badssl.com/ | ||||
| - [DCSec](https://cc.dcsec.uni-hannover.de/) - https*:*//cc.dcsec.uni-hannover.de/ | ||||
| - [Qualys SSL Labs](https://www.ssllabs.com/ssltest/viewMyClient.html) - https*:*//www.ssllabs.com/ssltest/viewMyClient.html | ||||
| - [Fortify](https://www.fortify.net/sslcheck.html) - https*:*//www.fortify.net/sslcheck.html | ||||
| - [How's My SSL](https://www.howsmyssl.com/) - https*:*//www.howsmyssl.com/ | ||||
| - [RC4](https://rc4.io/) - https*:*//rc4.io/ | ||||
| - [Heartbleed](https://filippo.io/Heartbleed/) - https*:*//filippo.io/Heartbleed/ | ||||
| - [Freak Attack](https://freakattack.com/clienttest.html) - https*:*//freakattack.com/clienttest.html | ||||
| - [Logjam](https://weakdh.org/) - https*:*//weakdh.org/ | ||||
| - [Symantec](https*:*//cryptoreport.websecurity.symantec.com/checker/views/sslCheck.jsp) - https*:*//cryptoreport.websecurity.symantec.com/checker/views/sslCheck.jsp | ||||
|  | ||||
| ### 5. Mozilla's Safe Browsing, Tracking Protection | ||||
| - [Attack](https://itisatrap.org/firefox/its-an-attack.html) | ||||
| - [Blocked](https://itisatrap.org/firefox/blocked.html) | ||||
| - [Malware](https://itisatrap.org/firefox/unwanted.html) | ||||
| - [Phishing](https://itisatrap.org/firefox/its-a-trap.html) | ||||
| - [Tracking](https://itisatrap.org/firefox/its-a-tracker.html) | ||||
| - [Attack](https://itisatrap.org/firefox/its-an-attack.html) - https*:*//itisatrap.org/firefox/its-an-attack.html | ||||
| - [Blocked](https://itisatrap.org/firefox/blocked.html) - https*:*//itisatrap.org/firefox/blocked.html | ||||
| - [Malware](https://itisatrap.org/firefox/unwanted.html) - https*:*//itisatrap.org/firefox/unwanted.html | ||||
| - [Phishing](https://itisatrap.org/firefox/its-a-trap.html) - https*:*//itisatrap.org/firefox/its-a-trap.html | ||||
| - [Tracking](https://itisatrap.org/firefox/its-a-tracker.html) - https*:*//itisatrap.org/firefox/its-a-tracker.html | ||||
|  | ||||
| ### 6. Other | ||||
| - [AudioContext](https://audiofingerprint.openwpm.com/) | ||||
| - [1] [Battery](https://pstadler.sh/battery.js/) | ||||
| - [2] [CSS History Leak](http://lcamtuf.coredump.cx/yahh/) | ||||
| - [DNS Leak](https://www.dnsleaktest.com/) | ||||
| - [DNS Spoofability](https://www.grc.com/dns/dns.htm) | ||||
| - [Evercookie](https://samy.pl/evercookie/) | ||||
| - [Firefox Add-ons](http://thehackerblog.com/addon_scanner/) | ||||
| - [localStorage](http://www.filldisk.com/) | ||||
| - [HSTS Supercookie](http://www.radicalresearch.co.uk/lab/hstssupercookies) | ||||
| - [HSTS [sniffly]](https://zyan.scripts.mit.edu/sniffly/) | ||||
| - [HTML5](https://www.youtube.com/html5) | ||||
| - [Keyboard Events](https://w3c.github.io/uievents/tools/key-event-viewer.html) | ||||
| - [Popup Killer](http://www.kephyr.com/popupkillertest/index.html) | ||||
| - [Popup Test](http://www.popuptest.com/) | ||||
| - [Redirects](https://jigsaw.w3.org/HTTP/300/Overview.html) | ||||
| - [Referer Headers](https://www.darklaunch.com/tools/test-referer) | ||||
| - [rel=noopener](https://mathiasbynens.github.io/rel-noopener/) | ||||
| - [Resource://URI](https://www.browserleaks.com/firefox) | ||||
| - [WebRTC IP Leak](https://www.privacytools.io/webrtc.html) | ||||
| - [AudioContext](https://audiofingerprint.openwpm.com/) - https*:*//audiofingerprint.openwpm.com/ | ||||
| - [1] [Battery](https://pstadler.sh/battery.js/) - https*:*//pstadler.sh/battery.js/ | ||||
| - [2] [CSS History Leak](http://lcamtuf.coredump.cx/yahh/) - http*:*//lcamtuf.coredump.cx/yahh/ | ||||
| - [DNS Leak](https://www.dnsleaktest.com/) - https*:*//www.dnsleaktest.com/ | ||||
| - [DNS Spoofability](https://www.grc.com/dns/dns.htm) - https*:*//www.grc.com/dns/dns.htm | ||||
| - [Evercookie](https://samy.pl/evercookie/) - https*:*//samy.pl/evercookie/ | ||||
| - [Firefox Add-ons](http://thehackerblog.com/addon_scanner/) - http*:*//thehackerblog.com/addon_scanner/ | ||||
| - [localStorage](http://www.filldisk.com/) - http*:*//www.filldisk.com/ | ||||
| - [HSTS Supercookie](http://www.radicalresearch.co.uk/lab/hstssupercookies) - http*:*//www.radicalresearch.co.uk/lab/hstssupercookies | ||||
| - [HSTS [sniffly]](https://zyan.scripts.mit.edu/sniffly/) - https*:*//zyan.scripts.mit.edu/sniffly/ | ||||
| - [HTML5](https://www.youtube.com/html5) - https*:*//www.youtube.com/html5 | ||||
| - [Keyboard Events](https://w3c.github.io/uievents/tools/key-event-viewer.html) - https*:*//w3c.github.io/uievents/tools/key-event-viewer.html | ||||
| - [Popup Killer](http://www.kephyr.com/popupkillertest/index.html) - http*:*//www.kephyr.com/popupkillertest/index.html | ||||
| - [Popup Test](http://www.popuptest.com/) - http*:*//www.popuptest.com/ | ||||
| - [Redirects](https://jigsaw.w3.org/HTTP/300/Overview.html) - https*:*//jigsaw.w3.org/HTTP/300/Overview.html | ||||
| - [Referer Headers](https://www.darklaunch.com/tools/test-referer) - https*:*//www.darklaunch.com/tools/test-referer | ||||
| - [rel=noopener](https://mathiasbynens.github.io/rel-noopener/) - https*:*//mathiasbynens.github.io/rel-noopener/ | ||||
| - [Resource://URI](https://www.browserleaks.com/firefox) - https*:*//www.browserleaks.com/firefox | ||||
| - [WebRTC IP Leak](https://www.privacytools.io/webrtc.html) - https*:*//www.privacytools.io/webrtc.html | ||||
|  | ||||
| [1] Since Firefox 52, the Battery Status API is now chrome/privileged access and is not accessible by web pages. | ||||
|  | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Roman-Nopantski
					Roman-Nopantski