New App: Panther
-
The app complies with the inclusion criteria -
The app is not already listed in the repo or issue tracker. -
The original app author has been notified (and does not oppose the inclusion). -
Donated to support the maintenance of this app in F-Droid.
Link to the source code:
https://github.com/stringmanolo/pantherdev with source code. Includes workflow to compile and sign with github actions.
Link to app in another app store:
License used:
GPLv3
Category:
Privacy Browser
Summary:
Panther
Panther is a privacy-focused Android browser based on WebView.
Description:
Features
- Scrollable Settings Menu
- Click the Panther Icon
- Scriptable
- Allows you to control a second brower embeeded inside Panther
- Allows you to control the second browser using scripting languages like js, python, lua ...
- Read the section at the end if you interested in the Status of this feature
- Blocker
- Blocks common AD servers by replacing the downloaded AD by a custom file - Blocks common Trackers by replacing the downloaded javascript by a custom file
- You can Enable/Disable the Blocker - You can try to access https://google.com/search?q=Panther_Blocker_Test to confirm that is working. (The blocker will block any url that contains the "Panther_Blocker_Test" text)
- List of blocked strings: Panther/Panther/app/src/main/assets /adservers.txt
- Console support
- Add a console to view the console.log in Android, run commands, etc
- InApp Logs
- You can view all the requests the browser sends
- You can view all the requests blocked by Panther_Blocker (request is made but the result is ignored)
- Basic Browser Functionality
- Small Size
- Less than 1 MB size
- Hardcoded User-Agent by default:
- User-Agents typically reveal your operating system and browser version to every website you visit.
- Even browsers like Tor Browser do not fully address this issue. When they do, they only overwrite the HTTP headers to fake it.
- Panther overwrites the
navigator.userAgentproperty to protect you from JavaScript fingerprinting attacks. - This enhances your privacy and security, protecting you from automated web exploit kits.
- Default User-Agent: "Mozilla/5.0 (Linux; Android 14) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.6478.122 Mobile Safari/537.36"
- Editable User-Agent: Go to Hacking -> User-Agent -> Set your own and tap the "GO" button
- Change Search Engine
- Disable/Enable Javascript
- Allows Zoom In/Out even when webpages try to disable it
- Clears internal history upon closing the browser (use the Exit option in the scrollable menu):
- Internal history is only saved to allow navigation between pages
- Clears internal cache upon closing the browser:
- Internal cache is only saved during the session for faster page loading
- Special URLs:
-
#list- List all available urls -
#code- Shows rendered source code -
#cookie- Shows website cookies -
#clearconsole- Clear the console -
#clearlogs- Clear the logs -
#url- Shows Current Url
-
Scriptable
Scriptable Status
- Early development, only able to control it using the console and javascript calling it's api methods. Local Servers are still under early development.
Scriptable API
open
- Description: Open a webpage in the scriptable browser
- Syntaxis:
scriptable.open("https;//www.google.com/search?q=car", "");
click
- Description: Send click to a coordinate in the Scriptable browser
- Syntaxis:
scriptable.click(160, 235); // click the Images Tab in google search
resize
- Description: Resize Scriptable.
- Syntaxis:
scriptable.resize(400, 400); // Resize to 400 width 400 height
move
- Description: Move Scriptable around.
- Syntaxis:
scriptable.move(100, 600); // Move scriptable to the top left
goBack
- Description: Go to previous page on history.
- Syntaxis:
scriptable.goBack();
goForward
- Description: Go to next page on history.
- Syntaxis:
scriptable.goForward();
Edited by Licaon_Kter