mallorybowes / chrome-mal-idsLinks
Effort to list and aggregate known malicious Google Chrome Extension IDs
☆59Updated 3 years ago
Alternatives and similar repositories for chrome-mal-ids
Users that are interested in chrome-mal-ids are comparing it to the libraries listed below
Sorting:
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆75Updated 4 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆110Updated last week
- Security Content for the PEAK Threat Hunting Framework☆39Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Updated last month
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆73Updated 6 months ago
- Fast IOC and YARA Scanner☆85Updated 5 years ago
- ☆96Updated 7 months ago
- A Python package and command line utility for scanning emails with YARA rules☆21Updated 8 months ago
- Library of threat hunts to get any user started!☆46Updated 5 years ago
- IOCs published by Black Lotus Labs☆124Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last week
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- A tool to use novel locations to extract metadata from Office documents.☆64Updated 2 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- JPCERT/CC public YARA rules repository☆110Updated 3 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆24Updated 2 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated 2 years ago
- ☆44Updated 5 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- Can you pay the ransom in your country?☆14Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 months ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Turn any blog into structured threat intelligence.☆42Updated this week
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 2 weeks ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 7 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year