This is a source code of BCMA's "Block Cloudflare MITM Attack".
PRs are welcome.
This add-on will block, notify, or redirect your request if the target website is using Cloudflare.
function FindProxyForURL(url, host) { | |
if (url.substring(0, 5) == 'http:' || url.substring(0, 6) == 'https:') { | |
return "HTTP 192.168.192.10:8080"; | |
} | |
return "DIRECT"; | |
} |
if (navigator.connection.type === "cellular") { | |
browser.proxy.register( | |
"pac.js" | |
); | |
} |
<?xml version="1.0" encoding="utf-8"?> | |
<OpenSearchDescription xmlns="http://a9.com/-/spec/opensearch/1.1/"> | |
<ShortName>Searx Belgium</ShortName> | |
<Description>a privacy-respecting, hackable metasearch engine</Description> | |
<InputEncoding>UTF-8</InputEncoding> | |
<Image>https://searx.be/static/themes/oscar/img/favicon.png</Image> | |
<LongName>searx metasearch</LongName> | |
<Url type="text/html" method="post" template="https://searx.be/search"> | |
<Param name="q" value="{searchTerms}" /> | |
</Url> |
searx = {}; | |
searx.method = "POST"; | |
searx.autocompleter = true; |
# Google (Web) | |
# | |
# @website https://www.google.com | |
# @provide-api yes (https://developers.google.com/custom-search/) | |
# | |
# @using-api no | |
# @results HTML | |
# @stable no (HTML can change) | |
# @parse url, title, content, suggestion |
While searching why Google Recaptcha audio doesn't work on my Firefox:
I found that Google is trying to recognize if my browser is really a Firefox browser by applying a technique called canvas fingerprinting. The reason why the Google Recaptcha audio challenge didn't work for me is I'm using an extension that change my user agent every 10 minutes (Random User-Agent).
I stopped using this extension and switched to Trace. You may enable some features in the extension's settings (personally I enabled everything to be as untraceable as possible). Then I went to the whitelist tab of the extension's settings, after that I whitelisted https://www.google.com/recaptcha/*
& https://www.gstatic.com/recaptcha/*
and finally I disabled Canvas fingerpriting protection
and User-Agent randomiser
in the `Applied
global | |
user haproxy | |
group haproxy | |
daemon | |
defaults | |
mode tcp | |
balance leastconn | |
timeout client 30000ms | |
timeout server 30000ms |
[Unit] | |
Description=NetworkManager Watcher | |
Wants=NetworkManager-wait-online.service | |
After=NetworkManager-wait-online.service | |
[Service] | |
ExecStart=/usr/local/bin/nm-watcher | |
[Install] | |
WantedBy=multi-user.target |
{ | |
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", | |
"contentVersion": "1.0.0.0", | |
"parameters": { | |
"adminUsername": { | |
"type": "string", | |
"metadata": { | |
"description": "The name of the administrator of the new VM. Exclusion list: 'admin','administrator'" | |
} | |
}, |