GHOST//SCAN v2.4 | 解析中 |
0% | ELAPSED 00:00 |
Sigil

THERE YOU WERE.

Your digital shadow has been captured. The mirror never forgets.

// EDUCATIONAL DEMONSTRATION

This tool demonstrates passive browser intelligence techniques used by advertisers, data brokers, and threat analysts — in real time, against your actual device.

Nothing is stored. Nothing is transmitted beyond the API calls listed in our privacy policy. Everything you see is visible only to you.

See how they see you.

See how they sell you.

Sigil
Sigil

THERE YOU WERE.

Your digital shadow has been captured. The mirror never forgets.


│ WHAT IS BROWSER FINGERPRINTING? │

Every browser leaves a unique trace — a combination of hardware capabilities, installed fonts, graphics rendering characteristics, and behavioral patterns that make you identifiable across the web, even without cookies.

This tool demonstrates passive open-source intelligence (OSINT) techniques used by security researchers and threat analysts to identify and profile web traffic in real time.

Canvas Fingerprinting

Your GPU renders text and shapes in subtly unique ways. Differences in font rendering, anti-aliasing, and sub-pixel composition create a signature tied to your hardware.

WebGL Analysis

Your graphics driver exposes vendor strings, renderer details, and a full list of supported extensions — all of which differ between GPU models and driver versions.

Threat Intelligence

Your IP is cross-referenced against AbuseIPDB, VirusTotal, Shodan, and URLhaus in real time to assess prior malicious activity, open ports, and known vulnerabilities.

Network Leaks

WebRTC can reveal your real IP even behind a proxy or VPN through ICE candidate negotiation — a known browser behavior exploited by trackers and fraud detection systems.

Audio Fingerprinting

The Web Audio API processes sound differently across hardware. An offline audio context with synthetic oscillators produces a hash unique to your audio stack.

Font Enumeration

By measuring text rendered in different fonts, it's possible to detect which system fonts are installed — a vector that survives browser updates and incognito mode.

│ TOOLS & RESOURCES │

Check Your Fingerprint

EFF Cover Your Tracks — tests whether your browser is uniquely identifiable.
BrowserLeaks — exhaustive suite of browser leak tests (WebRTC, fonts, canvas, WebGL).
Am I Unique? — academic fingerprint uniqueness study.

Threat Intelligence

AbuseIPDB — community IP abuse reporting database.
VirusTotal — scan IPs, domains, and files against 70+ security engines.
Shodan — search engine for internet-exposed devices and open ports.
URLhaus — real-time malware URL feed by abuse.ch.

Vulnerability Databases

NIST NVD — the official US national vulnerability database (powers the CVE feed above).
CVE.org — authoritative CVE identifier registry.
Exploit-DB — public exploit and PoC archive by Offensive Security.

Harden Your Browser

Tor Browser — anonymised browsing with uniform fingerprint across all users.
Mullvad Browser — fingerprint-resistant browser built with the Tor Project.
uBlock Origin — content blocker that prevents tracker and fingerprint scripts.

Privacy & OSINT Guides

EFF Privacy — digital rights and surveillance defence resources.
OWASP Top 10 — the definitive web application security risk list.
Have I Been Pwned — check if your email appears in known data breaches.

Test Your Security Headers

SecurityHeaders.com — grades your site's HTTP response headers.
Mozilla Observatory — comprehensive HTTP security scanner and scorer.
SSL Labs — deep TLS/SSL configuration analysis by Qualys.