mallorybowes / chrome-mal-idsLinks
Effort to list and aggregate known malicious Google Chrome Extension IDs
☆60Updated 3 years ago
Alternatives and similar repositories for chrome-mal-ids
Users that are interested in chrome-mal-ids are comparing it to the libraries listed below
Sorting:
- Security Content for the PEAK Threat Hunting Framework☆40Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Updated 2 weeks ago
- A Python package and command line utility for scanning emails with YARA rules☆21Updated 3 weeks ago
- ☆48Updated last week
- Fast IOC and YARA Scanner☆89Updated 5 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated last week
- Collect chrome extensions from various devices and find out if they are malicious☆24Updated 3 weeks ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Updated 3 weeks ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 2 months ago
- ShellSweeping the evil.☆53Updated last year
- Library of threat hunts to get any user started!☆48Updated 5 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- ☆24Updated 11 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆76Updated last month
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- ☆96Updated 9 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Updated 3 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Updated last year
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆112Updated this week
- Yara Based Detection Engine for web browsers☆49Updated 4 years ago
- Collection of scripts used to analyse malware or emails☆20Updated 5 years ago
- ☆44Updated 7 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- ☆46Updated 2 years ago