Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.
☆59Dec 6, 2020Updated 5 years ago
Alternatives and similar repositories for chrome_extension
Users that are interested in chrome_extension are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A resource which illustrates how surveillance is being carried out around the world.☆20Mar 29, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆12Jun 29, 2021Updated 4 years ago
- This is where we work on the newsletter☆28Dec 2, 2017Updated 8 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- Reworked assets for Azure Sentinel using Cisco Umbrella logs as source. Includes logstash config for Cisco Umbrella using Cisco managed A…☆12Apr 14, 2020Updated 6 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86May 22, 2023Updated 2 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 10 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 9 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆41Nov 29, 2025Updated 5 months ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆99May 20, 2016Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scripts for making Hubot a CND Sidekick☆59Apr 14, 2016Updated 10 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- The Digital First Aid Kit has moved to Gitlab:☆111Jul 19, 2019Updated 6 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- API Tools☆27Apr 18, 2016Updated 10 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 4 months ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when it…☆21Apr 7, 2015Updated 11 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Mar 7, 2023Updated 3 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- ☆14Jan 31, 2018Updated 8 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago