Sniffly
Sniffing browser history using HSTS
Install / Use
/learn @diracdeltas/SnifflyREADME
Sniffly2
Sniffly2 is a variant of Sniffly which abuses HTTP Strict Transport Security headers and the Performance Timing API in order to sniff your browsing history in Chromium-based browsers.
Demo
Visit http://diracdeltas.github.io/sniffly in Chrome/Chromium/Brave/etc. with HTTPS Everywhere disabled.
Caveats:
- does not work on mobile or Firefox
- does not work over HTTPS due to mixed content blocking.
- adblockers may taint results
Acknowledgements
- crbug436451, reported by
imfaster...@gmail.com, for the idea of probing port 443 over HTTP - Scott Helme for providing an initial list of HSTS hosts
Related Skills
node-connect
340.2kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
84.1kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
340.2kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
commit-push-pr
84.1kCommit, push, and open a PR
