Browser Extension Analysis Framework - Scan, Analyze Chrome, firefox and Brave extensions for vulnerabilities and intels
☆737Feb 17, 2026Updated last month
Alternatives and similar repositories for ExtAnalysis
Users that are interested in ExtAnalysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Chrome extension designed for WordPress Vulnerability Scanning and information gathering!☆112Oct 29, 2022Updated 3 years ago
- A Chrome extension static analysis tool to help aide in security reviews.☆162Aug 15, 2023Updated 2 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- Google chrome extensions downloader coded in python☆15Dec 7, 2018Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,524Apr 9, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A browser extension for OSINT search☆1,752Mar 21, 2026Updated last week
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Neto | A tool to analyse browser extensions☆88Sep 20, 2020Updated 5 years ago
- Scanning pastebin with yara rules☆1,130Jan 10, 2026Updated 2 months ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆14Feb 23, 2019Updated 7 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 3 months ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,715Mar 21, 2026Updated last week
- A curated list of awesome YARA rules, tools, and people.☆4,168Mar 16, 2026Updated last week
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆557Mar 6, 2023Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,652Aug 28, 2025Updated 7 months ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,616Apr 15, 2025Updated 11 months ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,158Mar 30, 2023Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,571Jul 31, 2024Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 4 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆376Feb 4, 2024Updated 2 years ago
- A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️☆287Oct 18, 2023Updated 2 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,129Dec 7, 2022Updated 3 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,305Feb 14, 2026Updated last month
- ☆16Dec 14, 2017Updated 8 years ago