A developer chronicles building a specialized browser for reverse engineering by forking Chromium and Electron. Starting with JavaScript function hooking via Chrome DevTools Protocol, they progressed to creating custom CDP domains at the Blink layer to stealthily intercept canvas fingerprinting and other anti-bot techniques. The project evolved from a weekend prototype into a comprehensive tool featuring automatic deobfuscation, function overrides, and fingerprint payload decryption, demonstrating deep browser internals manipulation to analyze web security mechanisms.

20m read timeFrom nullpt.rs
Post cover image
Table of contents
PreambleHumble BeginningsHooking functions in JavaScriptContent ScriptsChrome Devtools ProtocolOOPif(S) I did it againtoString theoryForking ChromiumExtrasNext stepsFingerprint GalleryUntil next timeCredits
2 Comments

Sort: