A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate suspicious activities.
☆186Feb 9, 2025Updated last year
Alternatives and similar repositories for ExtensionHound
Users that are interested in ExtensionHound are comparing it to the libraries listed below
Sorting:
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- ☆23Mar 4, 2025Updated last year
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 4 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆476Oct 29, 2025Updated 4 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated last month
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆171Dec 7, 2025Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 2 weeks ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated last month
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last week
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆730Feb 14, 2026Updated last month
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆581Dec 6, 2025Updated 3 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆128Mar 14, 2026Updated last week
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 5 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Local CLI tool for browser extension risk analysis☆27Apr 11, 2025Updated 11 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆342Updated this week
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- ☆14Jan 8, 2026Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 4 months ago
- A repository to share publicly available Velociraptor detection content☆196Updated this week