mallorybowes / chrome-mal-idsLinks
Effort to list and aggregate known malicious Google Chrome Extension IDs
☆57Updated 2 years ago
Alternatives and similar repositories for chrome-mal-ids
Users that are interested in chrome-mal-ids are comparing it to the libraries listed below
Sorting:
- ☆22Updated 2 years ago
- Security Content for the PEAK Threat Hunting Framework☆30Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Yara Based Detection Engine for web browsers☆49Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- Collect chrome extensions from various devices and find out if they are malicious☆24Updated 7 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- Import AbuseCH IOC Feeds into MISP☆12Updated 4 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Updated 2 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- A tool to use novel locations to extract metadata from Office documents.☆62Updated 2 years ago
- Cyber Threats Detection Rules☆14Updated last month
- A tool for studying JavaScript malware.☆15Updated 2 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago
- Fast IOC and YARA Scanner☆80Updated 5 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated last month
- ☆19Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- A CALDERA plugin☆26Updated 11 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 2 months ago