mirror of
https://github.com/arkenfox/user.js.git
synced 2024-11-29 13:56:56 +01:00
Updated Appendix A Test Sites (markdown)
parent
6d76c83276
commit
eb31c14400
@ -43,7 +43,7 @@ These are good sources to grab information on your results in one hit, but **do
|
|||||||
### :small_orange_diamond: Other
|
### :small_orange_diamond: Other
|
||||||
- [AudioContext](https://audiofingerprint.openwpm.com/) - **h**ttps://audiofingerprint.openwpm.com/
|
- [AudioContext](https://audiofingerprint.openwpm.com/) - **h**ttps://audiofingerprint.openwpm.com/
|
||||||
- [Cache Fingerprinting](https://cookieless-user-tracking.herokuapp.com/) - **h**ttps://cookieless-user-tracking.herokuapp.com/
|
- [Cache Fingerprinting](https://cookieless-user-tracking.herokuapp.com/) - **h**ttps://cookieless-user-tracking.herokuapp.com/
|
||||||
* It does this by assigning a unique variable in a cached script (see [#436](https://github.com/ghacksuserjs/ghacks-user.js/issues/436#issuecomment-392069853))
|
* It does this by assigning a unique variable in a cached script (see [#436](https://github.com/arkenfox/user.js/issues/436#issuecomment-392069853))
|
||||||
* Article: https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
|
* Article: https://robertheaton.com/2014/01/20/cookieless-user-tracking-for-douchebags/
|
||||||
- [CSS Exfil Vulnerability](https://www.mike-gualtieri.com/css-exfil-vulnerability-tester) - **h**ttps://www.mike-gualtieri.com/css-exfil-vulnerability-tester
|
- [CSS Exfil Vulnerability](https://www.mike-gualtieri.com/css-exfil-vulnerability-tester) - **h**ttps://www.mike-gualtieri.com/css-exfil-vulnerability-tester
|
||||||
* [CSS Keylogger with no CSP](https://no-csp-css-keylogger.badsite.io/) - **h**ttps://no-csp-css-keylogger.badsite.io/
|
* [CSS Keylogger with no CSP](https://no-csp-css-keylogger.badsite.io/) - **h**ttps://no-csp-css-keylogger.badsite.io/
|
||||||
|
Loading…
Reference in New Issue
Block a user