Privacy-focused web browser built with Rust + GTK3
- π« Built-in Ad Blocking
- π§ Tor Integration
- π€ AI Assistant sidebar
- π Tab Isolation
- π€ Anti-Fingerprinting
cargo build --release
./target/release/marshallRust 1.70+, GTK 3.0, WebKitGTK
GPL-3.0
How Marshall stacks up against other privacy browsers:
| Feature | Marshall | Tor Browser | Brave | Firefox (Hardened) | LibreWolf |
|---|---|---|---|---|---|
| Built-in Ad Blocker | β | β | β | β | β |
| Fingerprint Protection | β | β | β | ||
| WebRTC Leak Protection | β | β | β | β | |
| Tor Integration | β | β | β | β | β |
| DNS over HTTPS | β | β | β | β | β |
| Extension Sandbox | β | β | β | β | β |
| OSINT Tools Built-in | β | β | β | β | β |
| Zero Telemetry | β | β | β | ||
| Honeypot Detection | β | β | β | β | β |
| Clear Data on Exit | β | β | β | ||
| Memory Footprint | Low | High | Medium | Medium | Medium |
| Startup Time | Fast | Slow | Fast | Medium | Medium |
β
= Full support |
Marshall includes built-in tools designed for security researchers and OSINT professionals:
Right-click context menu options on any page:
- "Lookup IP on Shodan"
- "Check Domain WHOIS"
- "Analyze SSL Certificate"
- "View HTTP Headers"
- "Check Wayback Machine"
- "Search on VirusTotal"
- "DNS Enumeration"
| Tool | Description | Shortcut |
|---|---|---|
| IP Lookup | GeoIP, ASN, reputation check | Ctrl+Shift+I |
| WHOIS | Domain registration details | Ctrl+Shift+W |
| DNS Inspector | A, AAAA, MX, TXT, NS records | Ctrl+Shift+D |
| Header Viewer | Full HTTP request/response headers | Ctrl+Shift+H |
| Cert Analyzer | SSL/TLS certificate chain analysis | Ctrl+Shift+C |
| Tech Detector | Wappalyzer-style technology detection | Ctrl+Shift+T |
| Screenshot | Full-page capture with metadata strip | Ctrl+Shift+S |
| Source Viewer | Beautified source with syntax highlight | Ctrl+U |
Marshall is designed to protect against:
| Threat | Protection Method |
|---|---|
| Mass Surveillance | No telemetry, encrypted DNS, Tor support |
| Ad Tracking | Built-in blocker, cookie isolation |
| Browser Fingerprinting | Canvas/WebGL/Audio API protection |
| WebRTC IP Leaks | Disabled by default, mDNS ICE candidates |
| Cross-site Tracking | Third-party cookie blocking, referrer control |
| Malicious Extensions | Sandboxed execution, honeypot detection |
| SSL/TLS Attacks | Certificate pinning, HSTS preload |
| DNS Hijacking | DNS over HTTPS with DNSSEC validation |
| Session Hijacking | Clear-on-exit, secure cookie handling |
| Threat | Limitation |
|---|---|
| ISP Monitoring | Use Tor mode for full protection |
| Advanced Fingerprinting | Some techniques may still work |
| Zero-day Exploits | Keep updated, use paranoid mode |
| Threat | Recommendation |
|---|---|
| State-level Adversaries | Use Tor Browser + Tails |
| Physical Device Access | Use full-disk encryption |
| Compromised System | Reinstall OS from trusted media |
| Browser | Memory |
|---|---|
| Marshall | 312 MB |
| LibreWolf | 567 MB |
| Firefox | 689 MB |
| Brave | 723 MB |
| Chrome | 891 MB |
| Browser | Time |
|---|---|
| Marshall | 0.8s |
| Brave | 1.6s |
| Firefox | 2.1s |
| Chrome | 2.4s |
| Tor Browser | 4.2s |
Is Marshall based on Chromium or Firefox?
Neither. Marshall uses WebKitGTK as its rendering engine, which is the same engine that powers Safari and GNOME Web. This provides excellent privacy characteristics and avoids the Chromium/Google ecosystem entirely.
Can I use my existing browser extensions?
No. Marshall uses its own extension format designed for security. Chrome/Firefox extensions are not compatible. However, we provide similar functionality through our curated extension repository.
Does Marshall work with streaming services?
Most streaming services work, but some may require adjustments:
- Disable fingerprint protection for specific sites
- Enable DRM (Widevine) in settings if needed
- Some services may detect privacy tools
How do I enable Tor?
- Install Tor:
sudo apt install tororsudo pacman -S tor - Start the service:
sudo systemctl start tor - Launch Marshall with:
marshall --tor
Can I import bookmarks from other browsers?
Yes! Go to Bookmarks β Import and select:
- Firefox (places.sqlite)
- Chrome/Brave (Bookmarks JSON)
- Safari (Bookmarks.plist)
- HTML export from any browser
How do I report a security vulnerability?
Please report security issues privately to: security@nullsec.dev
Do NOT open public GitHub issues for security vulnerabilities.
[network.proxy]
enabled = true
type = "socks5"
host = "127.0.0.1"
port = 9050
[[network.proxy_chain]]
type = "socks5"
host = "127.0.0.1"
port = 9050
[[network.proxy_chain]]
type = "http"
host = "proxy.example.com"
port = 8080[[sites]]
pattern = "*.github.com"
javascript = true
cookies = "session"
fingerprint_protection = false
[[sites]]
pattern = "*.facebook.com"
block = truemarshall [OPTIONS] [URL]
Options:
-p, --private Private browsing mode
-t, --tor Route through Tor
--paranoid Maximum privacy mode
--proxy <PROXY> Use specified proxy
--profile <NAME> Use named profile
--no-extensions Disable extensions
--safe-mode Default settings
-h, --help Print help| Language | Status |
|---|---|
| πΊπΈ English | β Complete |
| πͺπΈ Spanish | β Complete |
| π©πͺ German | β Complete |
| π«π· French | π 90% |
| π―π΅ Japanese | π 75% |
| π¨π³ Chinese | π 60% |
- π Initial stable release
- β¨ Full privacy suite with tracker/ad blocking
- π Extension sandbox with honeypot detection
- π§ Tor integration
- π DNS over HTTPS support
- WebKitGTK β Rendering engine
- GTK4 β UI framework
- Rust β Programming language
- EasyList β Ad blocking filter lists
- Tor Project β Onion routing
Marshall is provided "as is" without warranty. No tool provides 100% anonymity. Use additional measures for high-risk activities. Keep your browser updated.