Marshall Browser πŸŒπŸ›‘οΈ

February 4, 2026 Β· View on GitHub

GitHub stars Rust GTK

Privacy-focused web browser built with Rust + GTK3

Features

  • 🚫 Built-in Ad Blocking
  • πŸ§… Tor Integration
  • πŸ€– AI Assistant sidebar
  • πŸ”’ Tab Isolation
  • πŸ‘€ Anti-Fingerprinting

Build

cargo build --release
./target/release/marshall

Requirements

Rust 1.70+, GTK 3.0, WebKitGTK

License

GPL-3.0


πŸ“Š Browser Comparison

How Marshall stacks up against other privacy browsers:

FeatureMarshallTor BrowserBraveFirefox (Hardened)LibreWolf
Built-in Ad Blockerβœ…βŒβœ…βŒβœ…
Fingerprint Protectionβœ…βœ…βš οΈβš οΈβœ…
WebRTC Leak Protectionβœ…βœ…βš οΈβŒβœ…
Tor Integrationβœ…βœ…βŒβŒβŒ
DNS over HTTPSβœ…βŒβœ…βœ…βœ…
Extension Sandboxβœ…βŒβŒβŒβŒ
OSINT Tools Built-inβœ…βŒβŒβŒβŒ
Zero Telemetryβœ…βœ…βš οΈβš οΈβœ…
Honeypot Detectionβœ…βŒβŒβŒβŒ
Clear Data on Exitβœ…βœ…βš οΈβš οΈβœ…
Memory FootprintLowHighMediumMediumMedium
Startup TimeFastSlowFastMediumMedium

βœ… = Full support | ⚠️ = Partial/configurable | ❌ = Not supported


πŸ”¬ OSINT & Security Research Features

Marshall includes built-in tools designed for security researchers and OSINT professionals:

Reconnaissance Tools

Right-click context menu options on any page:

  • "Lookup IP on Shodan"
  • "Check Domain WHOIS"
  • "Analyze SSL Certificate"
  • "View HTTP Headers"
  • "Check Wayback Machine"
  • "Search on VirusTotal"
  • "DNS Enumeration"

Built-in Utilities

ToolDescriptionShortcut
IP LookupGeoIP, ASN, reputation checkCtrl+Shift+I
WHOISDomain registration detailsCtrl+Shift+W
DNS InspectorA, AAAA, MX, TXT, NS recordsCtrl+Shift+D
Header ViewerFull HTTP request/response headersCtrl+Shift+H
Cert AnalyzerSSL/TLS certificate chain analysisCtrl+Shift+C
Tech DetectorWappalyzer-style technology detectionCtrl+Shift+T
ScreenshotFull-page capture with metadata stripCtrl+Shift+S
Source ViewerBeautified source with syntax highlightCtrl+U

πŸ›‘οΈ Threat Model

Marshall is designed to protect against:

βœ… Protected Against

ThreatProtection Method
Mass SurveillanceNo telemetry, encrypted DNS, Tor support
Ad TrackingBuilt-in blocker, cookie isolation
Browser FingerprintingCanvas/WebGL/Audio API protection
WebRTC IP LeaksDisabled by default, mDNS ICE candidates
Cross-site TrackingThird-party cookie blocking, referrer control
Malicious ExtensionsSandboxed execution, honeypot detection
SSL/TLS AttacksCertificate pinning, HSTS preload
DNS HijackingDNS over HTTPS with DNSSEC validation
Session HijackingClear-on-exit, secure cookie handling

⚠️ Partial Protection

ThreatLimitation
ISP MonitoringUse Tor mode for full protection
Advanced FingerprintingSome techniques may still work
Zero-day ExploitsKeep updated, use paranoid mode

❌ Not Designed For

ThreatRecommendation
State-level AdversariesUse Tor Browser + Tails
Physical Device AccessUse full-disk encryption
Compromised SystemReinstall OS from trusted media

πŸ“ˆ Performance Benchmarks

Memory Usage (10 tabs, 5 minutes idle)

BrowserMemory
Marshall312 MB
LibreWolf567 MB
Firefox689 MB
Brave723 MB
Chrome891 MB

Cold Start Time (SSD)

BrowserTime
Marshall0.8s
Brave1.6s
Firefox2.1s
Chrome2.4s
Tor Browser4.2s

❓ FAQ

Is Marshall based on Chromium or Firefox?

Neither. Marshall uses WebKitGTK as its rendering engine, which is the same engine that powers Safari and GNOME Web. This provides excellent privacy characteristics and avoids the Chromium/Google ecosystem entirely.

Can I use my existing browser extensions?

No. Marshall uses its own extension format designed for security. Chrome/Firefox extensions are not compatible. However, we provide similar functionality through our curated extension repository.

Does Marshall work with streaming services?

Most streaming services work, but some may require adjustments:

  • Disable fingerprint protection for specific sites
  • Enable DRM (Widevine) in settings if needed
  • Some services may detect privacy tools
How do I enable Tor?
  1. Install Tor: sudo apt install tor or sudo pacman -S tor
  2. Start the service: sudo systemctl start tor
  3. Launch Marshall with: marshall --tor
Can I import bookmarks from other browsers?

Yes! Go to Bookmarks β†’ Import and select:

  • Firefox (places.sqlite)
  • Chrome/Brave (Bookmarks JSON)
  • Safari (Bookmarks.plist)
  • HTML export from any browser
How do I report a security vulnerability?

Please report security issues privately to: security@nullsec.dev

Do NOT open public GitHub issues for security vulnerabilities.


πŸ”§ Advanced Configuration

Proxy Chains

[network.proxy]
enabled = true
type = "socks5"
host = "127.0.0.1"
port = 9050

[[network.proxy_chain]]
type = "socks5"
host = "127.0.0.1"
port = 9050

[[network.proxy_chain]]
type = "http"
host = "proxy.example.com"
port = 8080

Per-Site Settings

[[sites]]
pattern = "*.github.com"
javascript = true
cookies = "session"
fingerprint_protection = false

[[sites]]
pattern = "*.facebook.com"
block = true

Command Line Options

marshall [OPTIONS] [URL]

Options:
  -p, --private          Private browsing mode
  -t, --tor              Route through Tor
  --paranoid             Maximum privacy mode
  --proxy <PROXY>        Use specified proxy
  --profile <NAME>       Use named profile
  --no-extensions        Disable extensions
  --safe-mode            Default settings
  -h, --help             Print help

🌍 Localization

LanguageStatus
πŸ‡ΊπŸ‡Έ Englishβœ… Complete
πŸ‡ͺπŸ‡Έ Spanishβœ… Complete
πŸ‡©πŸ‡ͺ Germanβœ… Complete
πŸ‡«πŸ‡· FrenchπŸ”„ 90%
πŸ‡―πŸ‡΅ JapaneseπŸ”„ 75%
πŸ‡¨πŸ‡³ ChineseπŸ”„ 60%

πŸ“œ Changelog

v1.0.0 (2026-01-15)

  • πŸŽ‰ Initial stable release
  • ✨ Full privacy suite with tracker/ad blocking
  • πŸ”’ Extension sandbox with honeypot detection
  • πŸ§… Tor integration
  • πŸ” DNS over HTTPS support

πŸ™ Acknowledgments


⚠️ Disclaimer

Marshall is provided "as is" without warranty. No tool provides 100% anonymity. Use additional measures for high-risk activities. Keep your browser updated.