A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.
☆187Feb 9, 2025Updated last year
Alternatives and similar repositories for ExtensionHound
Users that are interested in ExtensionHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlueSky OSINT Tool☆15Dec 10, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 5 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 3 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16Apr 8, 2026Updated 3 weeks ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆479Oct 29, 2025Updated 6 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆87Apr 7, 2026Updated 3 weeks ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆174Mar 29, 2026Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 2 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Dec 2, 2024Updated last year
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆62Updated this week
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- ☆30Jan 13, 2026Updated 3 months ago
- An index of publicly available and open-source threat detection rulesets.☆133Apr 17, 2025Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆730Apr 2, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆584Apr 11, 2026Updated 2 weeks ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated 3 weeks ago
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆136Apr 24, 2026Updated last week
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 5 months ago
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 7 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Autonomous AI C2☆32Jul 23, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- ☆14Jan 8, 2026Updated 3 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last month
- A repository to share publicly available Velociraptor detection content☆203Apr 19, 2026Updated last week
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 26, 2026Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year
- Local CLI tool for browser extension risk analysis☆29Apr 11, 2025Updated last year