A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.
☆189Feb 9, 2025Updated last year
Alternatives and similar repositories for ExtensionHound
Users that are interested in ExtensionHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlueSky OSINT Tool☆15Dec 10, 2024Updated last year
- ☆24Mar 4, 2025Updated last year
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 6 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated 3 weeks ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16May 2, 2026Updated 2 weeks ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆481Oct 29, 2025Updated 6 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆86Apr 7, 2026Updated last month
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆175May 3, 2026Updated 2 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 2 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆104Dec 2, 2024Updated last year
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆66May 10, 2026Updated last week
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 5 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- ☆30Jan 13, 2026Updated 4 months ago
- An index of publicly available and open-source threat detection rulesets.☆135Apr 17, 2025Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆733Apr 2, 2026Updated last month
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆621May 8, 2026Updated last week
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆44May 8, 2026Updated last week
- A fork of the Go language with some tweaks☆55Jan 29, 2025Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆136Updated this week
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 5 months ago
- Simple hunting script for suspicious M365 OAuth Apps☆324Sep 23, 2025Updated 7 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 3 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 10 months ago
- ☆14Jan 8, 2026Updated 4 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last month
- A repository to share publicly available Velociraptor detection content☆203May 10, 2026Updated last week
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆25May 12, 2026Updated last week
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year