A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.
☆185Feb 9, 2025Updated last year
Alternatives and similar repositories for ExtensionHound
Users that are interested in ExtensionHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆23Mar 4, 2025Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Examine Chrome extensions for security issues☆97Nov 16, 2025Updated 4 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆479Oct 29, 2025Updated 5 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆85Updated this week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆173Mar 29, 2026Updated last week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated last month
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Dec 2, 2024Updated last year
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆54Updated this week
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Burp Suite extension for testing Passkey systems.☆76Apr 1, 2025Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last month
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆728Apr 2, 2026Updated last week
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆583Dec 6, 2025Updated 4 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆133Mar 14, 2026Updated 3 weeks ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Apr 3, 2026Updated last week
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 4 months ago
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 6 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Autonomous AI C2☆32Jul 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- ☆14Jan 8, 2026Updated 3 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated 2 weeks ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆391Mar 27, 2026Updated 2 weeks ago
- A repository to share publicly available Velociraptor detection content☆199Mar 29, 2026Updated last week
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 26, 2026Updated 2 weeks ago