Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.
☆60Dec 6, 2020Updated 5 years ago
Alternatives and similar repositories for chrome_extension
Users that are interested in chrome_extension are comparing it to the libraries listed below
Sorting:
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 3 weeks ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆20Mar 29, 2016Updated 9 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- This is where we work on the newsletter☆28Dec 2, 2017Updated 8 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- Reworked assets for Azure Sentinel using Cisco Umbrella logs as source. Includes logstash config for Cisco Umbrella using Cisco managed A…☆13Apr 14, 2020Updated 5 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86May 22, 2023Updated 2 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 9 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆42Nov 29, 2025Updated 3 months ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Qubes Split GPG configuration for qubes-gpg-server over TCP☆21Oct 8, 2024Updated last year
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Scripts for making Hubot a CND Sidekick☆59Apr 14, 2016Updated 9 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- The Digital First Aid Kit has moved to Gitlab:☆111Jul 19, 2019Updated 6 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 3 months ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Integrated MALware Simulator and Emulator☆13Dec 10, 2013Updated 12 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Mar 7, 2023Updated 3 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago