SecurityJosh / DownloadBlocker
A chrome extension which blocks downloads based on their file extension / origin. Can be used to prevent HTML Smuggling attacks.
☆11Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for DownloadBlocker
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- DNS logging, detection, ...☆15Updated 2 years ago
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- Open YARA scan- and search engine☆16Updated this week
- The official command line client for IPFinder☆11Updated 5 years ago
- ☆17Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Setting up a training environment for MISP☆11Updated last year
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 6 months ago
- Build and Interact with a Set of Virtual Machines☆15Updated last year
- A Passive DNS backend and collector☆31Updated 2 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Quantum Insert Backdoor POC☆10Updated 7 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 3 years ago
- ☆8Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated 10 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆12Updated 3 months ago
- The pattern matching swiss knife☆14Updated 5 years ago
- Cryptanalysis and attack library☆22Updated 2 years ago